Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective data mining technology. Besides that, this paper implementation of 4 data mining classification techniques was experimented for extracting important insights from the tourism data set. The aims were to find out the best performing algorithm among the compared on the results to improve the business opportunities in the fields related to tourism. The results of the 4 classifiers correctly classifier the attributes were JRIP (84.09%), Random Tree (83.66%), J48 (85.50%), and REP Tree (82.47%). All the results will be analyzed and discussed in this paper.
Background: The repair of bone defects remains a major clinical orthopaedic challenge. Bone is a highly vascularised tissue reliant on the close spatial and temporal connection between blood vessels and bone cells to maintain skeletal integrity. Angiogenesis thus plays a pivotal role in skeletal development and bone fracture repair. The role of angiogenic and osteogenic factors in the adaptive response and interaction of osteoblasts and endothelial cells during the multi step process of bone development and repair will be highlighted in this study. This study aimed to identify the role of local exogenous vascular endothelial growth factor in bone healing and to analyze the expression of VEGF by immunohistochemistry in created bone defect af
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreFreedom of opinion is one of the freedoms that constitutions and laws have guaranteed to protect and is exercised through the media. However, this freedom must be exercised within certain limits, which include respecting a person’s right to preserve his privacy, image and reputation. Just as the media has the freedom to exercise its right to publish and express its opinion with complete frankness, it is in return obligated to respect the rights of others and avoid defaming them and violating their privacy. If the media does this, the injured party has the right to demand compensation for the damage he has suffered as a result.
The deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show MoreThanks and gratefulness be to Allah , the most merciful , and prayers be on his messenger and our prophet mohammed and his descendants.The voices have great influence on the diversity of methods of complaints and implication in the Qur'anic expression through
their inspiration , forms and notes. They also have influence on performing semantic and psychological condition of the emitter . that is because of the connection between the complaints and human behavior and emotions , since it is considered as the outlet by which the human expresses his repressed desired and instincts . he resorted to it " when he is helpless physically and mentally i.e. he cannot reach his goals or satisfy his needs." Complaints come from deprivation , social
The Messengers and the Imam of the God-fearing, Muhammad is God, his family, and all of his companions. As for what comes after... Fainting is one of the involuntary symptoms and states that occur to a person when carrying out his life’s tasks suddenly due to his loss of sense and movement, so he loses consciousness for a period of time that is short or may be long, and the person is held accountable and responsible for every moment of his life. He is required to perform duties specified by Sharia law, such as prayer, fasting, and Hajj...and fainting prevents him from performing these actions. We must consider the opinions of jurists and know the legal implications resulting from it. It was said that a person has a capacity that enable
... Show Moreتناول المقال موضوع استثمار الذكاء الاصطناعي في تحليل البيانات الضخمة داخل المؤسسات العلمية، وركز على توضيح أهمية هذا التكامل في تعزيز الأداء الأكاديمي والبحثي. استعرضت المقالة تعريفات كل من الذكاء الاصطناعي والبيانات الضخمة، وأنواع البيانات داخل المؤسسات العلمية، ثم بينت أبرز التطبيقات العملية مثل التنبؤ بأداء الطلبة، والإرشاد الذكي، وتحليل سلوك المستخدمين، والفهرسة التلقائية. كما ناقشت المقالة التحدي
... Show More