In general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As the similarity between hospitals of the study sample was measured according to the standards of quality of health services under fuzzy conditions (a case of uncertainty of the opinions of patients who were in the evaluation of health services provided to them, which was represented by a set of criteria and was measured in the form of a Likert five-point scale). Moreover, those criteria were organized into a questionnaire containing 31 items. The research found a number of conclusions, the most important is that both methods of hierarchical cluster analysis and fuzzy cluster analysis, classify the hospitals of the research sample into two clusters, each cluster comprises a group of hospitals that depend on applying health quality service standards. The second important conclusion is that the fuzzy cluster analysis is more suitable for the classification of the research sample compared to hierarchical cluster analysis.
Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreThe present research aimed to study the polymorphisms of the chicken insulin-like growth factor 2 (IGF2) in two commercial broiler breeds (Cobb 500 and Hubbard F-15). In total, 300 avian blood samples were obtained. The genomic DNA was isolated using a fast salt-extraction technique. Moreover, polymerase chain reaction (PCR) was used to amplify 1146 bp fragments of the gene. The amplified fragments were subjected to restriction enzyme digestion using the HinfI endonuclease enzyme, and the digested products were separated on a 2% agarose gel. The findings indicated that there were two alleles, T and C, for the target locus, with frequencies of 73.3% and 26.7%, respectively. Three distinct genotype variations, TT, TC, and CC, were found, with
... Show MoreThe aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreAccurate land use and land cover (LU/LC) classification is essential for various geospatial applications. This research applied a Spectral Angle Mapper (SAM) classifier on the Landsat 7 (ETM+ 2010) & 8 (OLI 2020) satellite scenes to identify the land cover materials of the Shatt al-Arab region which is located in the east of Basra province during ten years with an estimate of the spectral signature using ENVI 5.6 software of each cover with the proportion of its area to the area of the study region and produce maps of the classified region. The bands of these datasets were analyzed using the Optimum Index Factor (OIF) statistic. The highest OIF represents the best and most appropr
Abstract:
Typological analysis about the negation marker in different languages is one of the fields of research that has attracted much attention. In Persian language, this constituent has been analysed from different aspects. This study aimed to analyse different aspects of negation marker in the adjectives, the noun phrases and the verb phrases based on typological analysis. Many studies have been revealed that the negation in adjectives has shown lexically and morphologically. In the noun phrases, /hich/ has used as a negative marker necessarily marking the verb phrase as negative too. In the verb phrases, negation occurs morphologically by the addition of the prefix /n
... Show MoreAbstract The purpose of this paper is to preparing small games for fifth graders. And to identify the impact of these small games in developing some concepts of traffic safety for fifth graders. The two researchers used the experimental method to solve the research problem, and the research community was identified with students. The fifth grade of primary school in the province of Baghdad and a sample was chosen from the private Baghdad Primary School, which numbered (60) male and female students. They were distributed equally into two groups by simple random method (experimental and control groups). As for the most important conclusions reached by the two researchers, it is the presence of an effect of small games in developing some conce
... Show MoreThe current research aims at finding out how to properly and correctly manage waste and solid waste and reduce the difficulties faced by all countries. However, it is becoming increasingly acute in developed cities because their economies are growing rapidly. It is necessary to identify the modern methods used in developed countries in managing wastes. The use of modern waste management techniques is a coordinated effort by international agencies within the borders responsible for them. The problem of the study can be identified in the lack of clarity of environmental management procedures in place. The importance of the research contributes to providing greater capacity to the administrative and technical leadership in the municipality
... Show MoreThis study investigates the impact of spatial resolution enhancement on supervised classification accuracy using Landsat 9 satellite imagery, achieved through pan-sharpening techniques leveraging Sentinel-2 data. Various methods were employed to synthesize a panchromatic (PAN) band from Sentinel-2 data, including dimension reduction algorithms and weighted averages based on correlation coefficients and standard deviation. Three pan-sharpening algorithms (Gram-Schmidt, Principal Components Analysis, Nearest Neighbour Diffusion) were employed, and their efficacy was assessed using seven fidelity criteria. Classification tasks were performed utilizing Support Vector Machine and Maximum Likelihood algorithms. Results reveal that specifi
... Show MoreThe research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim
... Show MoreThe background subtraction is a leading technique adopted for detecting the moving objects in video surveillance systems. Various background subtraction models have been applied to tackle different challenges in many surveillance environments. In this paper, we propose a model of pixel-based color-histogram and Fuzzy C-means (FCM) to obtain the background model using cosine similarity (CS) to measure the closeness between the current pixel and the background model and eventually determine the background and foreground pixel according to a tuned threshold. The performance of this model is benchmarked on CDnet2014 dynamic scenes dataset using statistical metrics. The results show a better performance against the state-of the art
... Show More