Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.
A numerical investigation has been performed to study the effect of eccentricity on unsteady state, laminar aiding mixed convection in a horizontal concentric and eccentric cylindrical annulus. The outer cylinder was kept at a constant temperature
while the inner cylinder was heated with constant heat flux. The study involved numerical solution of transient momentum (Navier-Stokes) and energy equation using finite difference method (FDM), where the body fitted coordinate system (BFC) was
used to generate the grid mesh for computational plane. The governing equations were transformed to the vorticity-stream function formula as for momentum equations and to the temperature and stream function for energy equation.
A computer progra
In this work, an experimental investigation has been done for heat transfer by natural-convection through a horizontal concentric annulus with porous media effects. The porous structure in gap spacing consists of a glass balls and replaced by plastic (PVC) balls with different sizes. The outer surface of outer tube is isothermally cooled while the outer surface of inner tube is heated with constant heat flux condition. The inner tube is heated with different supplied electrical power levels. Four different radius ratios of annulus are used. The effects of porous media material, particles size and annulus radius ratio on heat dissipation in terms of average Nusselt number have been analyzed. |
A novel welded demountable shear connector for sustainable steel-concrete composite structures is proposed. The proposed connector consists of a grout-filled steel tube bolted to a compatible partially threaded stud, which is welded on a steel section. This connector allows for an easy deconstruction at the end of the service life of a building, promoting the reuse of both the concrete slabs and the steel sections. This paper presents the experimental evaluation of the structural behavior of the proposed connector using a horizontal pushout test arrangement. The effects of various parameters, including the tube thickness, the presence of grout infill, and the concrete slab compressive strength, were assessed. A nonlinear finite element mode
... Show MoreThe present study develops an artificial neural network (ANN) to model an analysis and a simulation of the correlation between the average corrosion rate carbon steel and the effective parameter Reynolds number (Re), water concentration (Wc) % temperature (T o) with constant of PH 7 . The water, produced fom oil in Kirkuk oil field in Iraq from well no. k184-Depth2200ft., has been used as a corrosive media and specimen area (400 mm2) for the materials that were used as low carbon steel pipe. The pipes are supplied by Doura Refinery . The used flow system is all made of Q.V.F glass, and the circulation of the two –phase (liquid – liquid ) is affected using a Q.V.F pump .The input parameters of the model consists of Reynolds number , w
... Show MoreThis work presents an experimental study of heat transfer and flow of distilled water and metal oxide nanofluid Fe3O4-distilled water at concentrations of (φ = 0.3, 0.6, 0.9 %) by volume in a horizontal pipe with constant magnetic field. All the tests are carried out with Reynolds number range (2900-9820) and uniform heat flux (11262-19562 W/m2). The results show that, the nanofluid concentration and magnetic intensity increase, the Nusselt number increases. The maximum enhancement in Nusselt number with magnetic nanofluid is (5.4 %, 26.4 %, 42.7 %) for volume concentration (0.3, 0.6, 0.9 %) respectively. The enhancement is maximized with magnetic intensity (0.1, 0.2, 0.3 tesla) respectively to (43.9, 44
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreOptimizing the Access Point (AP) deployment is of great importance in wireless applications owing the requirement to provide efficient and cost-effective communication. Highly targeted by many researchers and academic industries, Quality of Service (QOS) is an important primary parameter and objective in mind along with AP placement and overall publishing cost. This study proposes and investigates a multi-level optimization algorithm based on Binary Particle Swarm Optimization (BPSO). It aims to an optimal multi-floor AP placement with effective coverage that makes it more capable of supporting QOS and cost effectiveness. Five pairs (coverage, AP placement) of weights, signal threshol
With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show More