This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obtained rules from positive association rules and negative association rules strengthens to each other with a pretty good confidence score.
Abstract
Metal cutting processes still represent the largest class of manufacturing operations. Turning is the most commonly employed material removal process. This research focuses on analysis of the thermal field of the oblique machining process. Finite element method (FEM) software DEFORM 3D V10.2 was used together with experimental work carried out using infrared image equipment, which include both hardware and software simulations. The thermal experiments are conducted with AA6063-T6, using different tool obliquity, cutting speeds and feed rates. The results show that the temperature relatively decreased when tool obliquity increases at different cutting speeds and feed rates, also it
... Show MoreThe objectives of this research are to determine and find out the reality of crops structure of greenhouses in association of Al-Watan in order to stand on the optimal use of economic resources available for the purpose of reaching a crop structure optimization of the farm that achieves maximize profit and gross and net farm incomes , using the method of linear programming to choose the farm optimal plan with the highest net income , as well as identifying production plans farm efficient with (income - deviation) optimal (E-A) of the Association and derived, which takes into account the margin risk wich derived from each plan using the model( MOTAD), as a model of models of linear programming alternative programming m
... Show MoreSteganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.
The process of transporting waste from urban areas to sanitary landfill sites requires large amounts of money due to the length and distance. To address this problem, temporary transfer stations were established by the Municipality of Baghdad to reduce the cost of transportation, and for the purpose of preserving the environment in a sustainable manner, standards were set for the establishment of these stations. The two stations of Al-Karrada Municipality and Al-Shula Municipality were chosen as a case study to measure the extent of adopting and applying the standards for establishing substations locally, regionally and internationally, and the most important results were reached Which is that the transforming (regular) stations of the t
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreThe volatility of the financial markets and the oil market plays a major role in influencing macroeconomic activity, as well as the high interaction between the both markets and the remarkable sensitivity to their each other fluctuations which cause the undesirable impact on other economic sectors as an expected result due the mentioned interaction.
The study aimed to analyze the relationship between the volatility of the major US market indices represented by the DJIA index, S & P500, due to their comprehensiveness of the financial market, as they summarize the performance of the entire US market which is the largest economy in the world, as well as the difference in the calculation mechanism, and oi
... Show MorePositive and negative parity states for 114Te have been studied applying the vibration al limit U(5) of Interacting boson model (IBM- 1 ) . The present results have shown their good agreement with experimental data in addition to the determination of the spin/parity of new energy levels are not assigned experimentally as the levels 0+2 and 5+1 and the levels 3"1 and 5-1 . Then back propagation multiLayer neural network used for positive and negative parity states for 114Te and shown their membership to the Vibration limit U(5) the network implemented by MATLAB system.
Abstract
This study aimed to identify the business risks using the approach of the client strategy analysis in order to improve the efficiency and effectiveness of the audit process. A study of business risks and their impact on the efficiency and effectiveness of the audit process has been performed to establish a cognitive framework of the main objective of this study, in which the descriptive analytical method has been adopted. A survey questionnaire has been developed and distributed to the targeted group of audit firms which have profession license from the Auditors Association in the Gaza Strip (63 offices). A hundred questionnaires have been distributed to the study sample of which, a total of 84 where answered and
... Show MoreAbstract:
This research aims to identify the impact of the Layout Ghazi al-Hariri hospital for surgery specialist on customer satisfaction (patients) using the model (Servicescape), the problem of the research represented in the extent to which the hospital management design of the service and Layout hospital aesthetic and functional aspects that fit patients for therapeutic and nursing services , and used the developer scale by (Miles et al., 2012) for data collection, which includes the independent variable in (17) items distributed in three dimensions (Facility aesthetics , hospital cleanliness, and the Layout accessibility ) The dependent variable is the satisfaction of customers (pat
... Show MoreThe research aims to measure the accounting conservatism practice of listed companies in the Iraq stock exchange using Basu model to measure the degree of accounting conservatism in a sample of companies of (21) companies for the period from 2007 to 2011, the researcher found that most of the listed companies in the market exercised accounting conservatism when measurement and disclosure of the result of the activity and financial position and there is a variation in the degree of accounting conservatism between economic sectors , which included banking , investment , insurance , industry , agriculture , tourism and hotels.
Because the practice of accounting conservatism properly
... Show More