This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obtained rules from positive association rules and negative association rules strengthens to each other with a pretty good confidence score.
This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa
... Show More
The problem with research lies in hiding the Hanbali approach in building long and short travel provisions, as well as hiding some provisions relating to short travel that are not provided for by the jurists of Hanbali (in their books).
The research aims to demonstrate the approach and standards on which they based the long and short travel provisions, as well as to reflect the provisions of some of the issues that are silent on long and short travel, with evidence and significance.
The research included a preface and two researches, the researcher in the preface talked about the reality of long and short travel, in the first research on the approach of ha
... Show MoreBackground: Type 2 diabetes mellitus (T2DM) is a chronic disorder that constitutes a major health problem worldwide. Toxoplasma gondii is an intracellular parasite that may infect any nucleated cell. Toxoplasmosis is becoming a worldwide health threat, infecting 30–50% of the world’s human population. The studies that have been undertaken to investigate the link between T. gondii infection and diabetes have shown contradictory fi ndings. This research aimed to look at the possible link between T2DM and T. gondii infection. Methods and Subjects: The enzyme-linked immunosorbent assay (ELISA) approach was used to screen for T. gondii IgM and IgG antibodies in 69 patients with T2DM and 92 seemingly healthy persons as controls. Resul
... Show MoreThis study was aimed to investigate the association between thyroid disorder and Helicobacter pylori infection in 122 patients (100 females and 22 males )and for comparison, 60 healthy individuals (31females and 29 males),who had no thyroid disorder, were also included in the study. Blood samples were collected from both patients and the healthier individuals. Enzyme Linked Fluorescent Assay (ELFA) technique through using Vitek Immuno Diagnostic Assay System (VIDAS) was applied to measure levels of the thyroid hormones (tri-iodothyronine T3, tetra-iodothyroxine T4) and thyroid stimulating hormone (TSH). From the results obtained, patients were classified into three groups: 40 were
... Show MoreTo maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreIn this study, a fast block matching search algorithm based on blocks' descriptors and multilevel blocks filtering is introduced. The used descriptors are the mean and a set of centralized low order moments. Hierarchal filtering and MAE similarity measure were adopted to nominate the best similar blocks lay within the pool of neighbor blocks. As next step to blocks nomination the similarity of the mean and moments is used to classify the nominated blocks and put them in one of three sub-pools, each one represents certain nomination priority level (i.e., most, less & least level). The main reason of the introducing nomination and classification steps is a significant reduction in the number of matching instances of the pixels belong to the c
... Show MoreThe aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreRESUMEN
Una joven cuenta cómo, en plena noche, aprovechando la tranquilidad de esa hora, sale a escondidas de su casa y va a reunirse con su enamorado. Envuelta en la oscuridad, se deja dirigir por la luz de su propio amor hasta el lugar de la cita, donde la pasión de los amantes culmina. A continuación, relajados por la brisa nocturna, los amantes se adormecen, primero, el amado velado por la amada, por último, ella misma.
Amor entre dos enamorados. Unión mística de alma y Dios , aunque , de hecho , podría servirnos de clara exposición temática el subtitulo con que el poema suele publicarse en la tradición , tanto manuscrita como impresa : Canciones del alma que se goza d
... Show MoreIn solar-thermal adsorption/desorption processes, it is not always possible to preserve equal operating times for the adsorption/desorption modes due to the fluctuating supply nature of the source which largely affects the system’s operating conditions. This paper seeks to examine the impact of adopting unequal adsorption/desorption times on the entire cooling performance of solar adsorption systems. A cooling system with silica gel–water as adsorbent-adsorbate pair has been built and tested under the climatic condition of Iraq. A mathematical model has been established to predict the system performance, and the results are successfully validated via the experimental findings. The results show that, the system can be operational
... Show More