This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obtained rules from positive association rules and negative association rules strengthens to each other with a pretty good confidence score.
Breast cancer is the most common malignancy in female and the most registered cause of women’s mortality worldwide. BI-RADS 4 breast lesions are associated with an exceptionally high rate of benign breast pathology and breast cancer, so BI-RADS 4 is subdivided into 4A, 4B and 4C to standardize the risk estimation of breast lesions. The aim of the study: to evaluate the correlation between BI-RADS 4 subdivisions 4A, 4B & 4C and the categories of reporting FNA cytology results. A case series study was conducted in the Oncology Teaching Hospital in Baghdad from September 2018 to September 2019. Included patients had suspicious breast findings and given BI-RADS 4 (4A, 4B, or 4C) in the radiological report accordingly. Fine needle aspirati
... Show MoreThis research investigates the subject of the impact of wars (as a manifestation of crisis) on architecture, and the extent of continuing wars physical and moral results of wars, even after the end of the cause of the crisis. The impact of different rebuilding which exposed to the effects of the war seems different in crisis regions.
The problem of research is about the uncertainty of the impact of the way chooses for reconstructing the buildings after wars in the continuity of the crisis of war. The goals of this research are to clarify the influence of methods of reconstruction of buildings in a city chosen which is Beirut, on the continuation of the war crisis with the argument of demolishing and rebuilding newly or keeping tr
... Show MoreRadiation measuring devices need to periodic calibration process to examine their sensitivity and the extent of the response. This study is used to evaluate the radiation doses of the workers in the laboratories of the Directorate of Safety as a result of the use of point sources in calibrating of the devices in two ways, the first is the direct measurement by the FAG device and the others using RESRAD and RAD PRO programs. The total doses values using FAG were (2.57 μSv/y, 102.3 μSv/y and 20.75 μSv/y for TLD laboratory, Gamma spectroscopy analyses (GSA) laboratory and equipment store respectively, and the total doses that calculated using RESRAD and RAD PRO were 1.518 μSv/y, 76.65 μSv/y and 21.2 μSv/y for the above laboratories. t
... Show MoreThis research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreThe alfalfa plant, after harvesting, was washed, dried, and grinded to get fine powder used in water treatment. We used the alfalfa plant with ethanol to make the alcoholic extract characterized by using (GC-Mass, FTIR, and UV) spectroscopy to determine active compounds. Alcoholic extract was used to prepare zinc nanoparticles. We characterized Zinc nanoparticles using (FTIR, UV, SEM, EDX Zeta potential, XRD, AFM). Zinc nanoparticle with Alfalfa extract and alfalfa powder were used in the treatment of water polluted with inorganic elements such as Cr, Mn, Fe, Cu, Cd, Ag by (Batch processing). The batch process with using alfalfa powder gets treated with Pb (51.45%), which is the highest percentage of treatment. Mn (13.18%), which is the
... Show MoreThe paper deals with the marked vocabulary of Russian and Arabic language, and the extrapolated to the phraseological layer of the mentioned language systems. Specificity of the functioning of this process is presented against the backdrop of the peculiarities of the existence of Russian and Arabic languages. Attention is focused on the fact that linguistic markers should be considered as a kind of keys that represent the specificity of the experience of being experienced by an individual in ontological reality. It is asserted that marking can be revealed practically at all levels of the language polysystem, but it is especially productive on its lexical layer, in particular, on the basis of lexicology and ph
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show More