This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obtained rules from positive association rules and negative association rules strengthens to each other with a pretty good confidence score.
Analysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.
By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.
We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.
There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.
Key Word: Analysis of variatio
... Show Moreبكل تواضع، نقدم لكم هذا الكتاب بعنوان "الصحة النفسية في عصر التكنولوجيا: تحليل للتحديات والفرص المتاحة". يسعى الكتاب إلى إلقاء الضوء على العلاقة المعقدة بين عالمنا الرقمي المتنامي وصحة عقولنا وقلوبنا. نعيش في زمن يشهد تغييرات كبيرة نتيجة التقدم التكنولوجي، حيث أصبحت الأدوات الرقمية جزءًا أساسيًا من حياتنا اليومية، تؤثر في أساليب تواصلنا، تعلمنا، وتفاعلنا مع محيطنا. لذا، يصبح من الضروري فهم تأثير هذه التقنيا
... Show MoreThe widespread use of the Internet of things (IoT) in different aspects of an individual’s life like banking, wireless intelligent devices and smartphones has led to new security and performance challenges under restricted resources. The Elliptic Curve Digital Signature Algorithm (ECDSA) is the most suitable choice for the environments due to the smaller size of the encryption key and changeable security related parameters. However, major performance metrics such as area, power, latency and throughput are still customisable and based on the design requirements of the device.
The present paper puts forward an enhancement for the throughput performance metric by p
... Show MoreThis study aims at examining and confirming the patterns of phenetic relationships and the levels of variations within and among the species of Lotus L., 1753 in Egypt by using morphometric analysis techniques. We have evaluated 24 morphological characters from about 300 herbarium specimens representing 19 species of Lotus that are currently recognized. Based on numerical analyses of macromorphological characters (cluster analysis, principal coordinate analysis and principal component analysis), 19 species of Lotus were recognized from Egypt. These species were clustered in six species-specific groups: (I) Lotus halophilus Boiss. & Spruner, L. angustissimus L., L. glinoides Delile and L. schimperi Steud. ex Boiss., (II) Lotus glaber
... Show MoreHuman resources are considered as strategic fortune for being the main driver of the development wheel in the society, and the field of education and learning is one of the main pillars of this fortune for its great effect in the process of economic and social progress of individuals. I was the subject of education to the concerns of many countries, as adopted national policies . And regional support and the reduction of constraints, so came our study (education hub for human development) to identify the role of education in human development and to identify the obstacles facing the education process and the extent of its impacts negatively on the process of human development also contribute to the knowledge of school enrollment and the
... Show MoreThe article provides a comparative analysis of comparisons in Russian and Arabic, aimed at identifying their structural, typological, and functional-pragmatic features. The study is based on a systematic approach to the analysis of linguistic means of expressing comparisons in two differ- ent linguistic cultures. The article analyzes the main structural components of comparisons, their classification, and their cognitive and aesthetic functions. The results of the study demonstrate the deep cultural conditioning of comparative constructions and their important role in representing the specific features of the respective linguistic cultures.
The study employs Critical Discourse Analysis (CDA) to analyze how technological discourses are influenced by AI-generate d English texts. The research marries Fairclough’s three-dimensional discourse analysis, Van Dijk’s socio-cognitive approach, and Corpus-Assisted Discourse Studies (CADS) in the use of mixed-methods research, integrating primarily qualitative analysis with quantitative corpus-based data, to perform a thorough analysis of twenty AI-produced English texts. The findings identify the sophisticated linguistic mechanisms through which AI language employs modality, nominalization, passive voice, and interdiscursive blending to normalize and legitimize dominant contemporary ideologies. These mechanisms serve to legitimize te
... Show MoreDigital forensics has become a fundamental requirement for law enforcement due to the growing volume of cyber and computer-assisted crime. Whilst existing commercial tools have traditionally focused upon string-based analyses (e.g., regular expressions, keywords), less effort has been placed towards the development of multimedia-based analyses. Within the research community, more focus has been attributed to the analysis of multimedia content; they tend to focus upon highly specialised specific scenarios such as tattoo identification, number plate recognition, suspect face recognition and manual annotation of images. Given the ever-increasing volume of multimedia content, it is essential that a holistic Multimedia-Forensic Analysis Tool (M-
... Show More