Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.
the behavior of the first-order black and gray solitons propagtedin optical fiber in the presence of frequency chirp is studied analytically and numerically results show that phase profile of black solitons changes abruptly
The problem of frequency estimation of a single sinusoid observed in colored noise is addressed. Our estimator is based on the operation of the sinusoidal digital phase-locked loop (SDPLL) which carries the frequency information in its phase error after the noisy sinusoid has been acquired by the SDPLL. We show by computer simulations that this frequency estimator beats the Cramer-Rao bound (CRB) on the frequency error variance for moderate and high SNRs when the colored noise has a general low-pass filtered (LPF) characteristic, thereby outperforming, in terms of frequency error variance, several existing techniques some of which are, in addition, computationally demanding. Moreover, the present approach generalizes on existing work tha
... Show MoreIt has been well documented that hemodialysis patients have impaired immune response, which may result in higher prevalence rates of viral infections, including CMV. Infections in these patients may be due to primary infection or, more commonly, by reactivation of latent virus or re-infection with exogenous virus, which may be introduced by blood transfusion. The aim of this study was to evaluate the frequency of CMV-IgG and IgM antibodies among hemodialysis patients. The current research included 116 hemodialysis patients (69 male and 47 female) who attended to Tikrit Teaching Hospital for the period from beginning of October/2013 to the end of April/2014. CMV-IgG was found in 102 out of 116 (87.9%), while CMV- IgM was detected in 10 ou
... Show MoreThe present study was carried out onAl-Saqlawiya poultry farm's soil (Anbar, Iraq) for the period of 8 months (November 2018- June 2019). A total of 75 samples of poultry droppings were collectedrandomly. 552 individuals of mite,belonging to 3 orders and 8 families representing 15 species, were found. These species were: Acarus gracilis, Acarus siro, Caloglyphus berlesi, Androlaelaps casalis, Sejus temperaticus, Parasitus paraconsanguineus, Eugamasus butleri, Macrocheles medarius, Macrocheles glaber, Macrocheles muscaedomesticae, Macrocheles matrius, Kleemannia plumosus, Cheyletus eruditus, Cheyletus malaccensis, and Pyemotes herfsi.
The highest population density belonged to order
... Show MoreWith the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael
... Show MoreWith the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of
... Show MoreIn this paper, the relationship between urban growth, land use, site availability, and impacts on the general appearance of the city generated by functional characteristics of port cities were analyzed. Various data were used to identify patterns of land use change and city growth and expansion. The research aims to analyze the impact of the port on the growth of the city, study the urban growth of the city of Umm Qasr and predicting the growth trends, and to identify the most influential factors in this growth. The study dealt with the concepts of urban growth and the factors that characterize the growth of port cities and the current situation of the city. The practical part included the mechanisms used by the researcher to analyze the
... Show MoreAbstract
All of us are indispensable for this rule (the most important and important) individuals, whether we were groups of leaders or followers of peoples or countries because the rule provides adequate guarantees for the correct positions and drawing the plan for successful decision-makers matching with the balances of Sharia without incompatibility between religious or worldly interests or legal positions and therefore in the framework of the most important appointment And distinguish it from the important from the interests or the appointment of the most important and distinguish from the important from the evils and through this rule we learn about the scientific and practical solutions t
... Show MoreReceipt date:10/27/2021 accepted date:12/15/2021 Publication date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The phenomenon of extremist extremism (terrorism) was one of the most prominent issues that took a large space in the twenty-first century, in which cognitive motives were mixed with strategic and ideological motives, leading to the emergence of terrorist extremi
... Show More