Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective data mining technology. Besides that, this paper implementation of 4 data mining classification techniques was experimented for extracting important insights from the tourism data set. The aims were to find out the best performing algorithm among the compared on the results to improve the business opportunities in the fields related to tourism. The results of the 4 classifiers correctly classifier the attributes were JRIP (84.09%), Random Tree (83.66%), J48 (85.50%), and REP Tree (82.47%). All the results will be analyzed and discussed in this paper.
In his post colonial novel, In the Skin of a lion, the Canadian/Sri Lankan writer,
Michael Ondaatje is so interested in the term "Post colonialism" because he wants to show
that the term doesn't only refer to a period of time that comes after colonialism. In other
words, post colonialism is not only referred to as a literal description of formerly colonial
societies. He deals with the termas a literary genre and an academic construct that describes
the global conditions of a man after a period of colonialism. He shows that post colonialism is
a theory that tries to examine and explore the different styles and faces of European authority
to control the colonized. Ondaatje's attempt through such term is to unmask Europ
Objective: To evaluate the psychological work environment's effect on the workers’ productivity in Baghdad
City industries at Al-Rusafa and Al-Karkh Sectors.
Methodology: A descriptive evaluation design is employed throughout the present study from May 25th 2012
through January 7
th
, 2014. A purposive (non probability) sample is selected for the study which includes (500)
workers from industries at AL-Russafa and AL-Kerch sectors in Baghdad City. A questionnaire is constructed to
gather data which may assist to achieve the objective of the study. Content validity of the instrument is
determined through eliciting the opinions of a panel of (10) experts and the reliability through a pilot study by
using intern
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe linguistic meaning of the verse in the Arabic dictionaries applies very much to the reality of rent and its effect. This is true of economic growth as a continuous increase in real per capita income in addition to the same thing. Therefore, development does not necessarily achieve a comprehensive and structural increase of the various economic sectors. As the rent came in the sense of a terrible land open Maim any fertilized. And the camel is a ma'aya and a ra'i: that is, it goes in the pasture and returns itself. This is similar to the extraction of oil after it is ready for investment and earn its revenue as soon as it exists or is extracted by external parties. If the rent is first linked to agriculture, especially the fertile lan
... Show MoreThe subject of the provisions of prayer on the chairs of the important topics in the jurisprudence they fall under the door of the people of excuses, and this section of the important doors in Islamic jurisprudence because it permeates scourge, as prayer is one of the pillars of this religion, and the first thing to be held accountable on the Day of Resurrection prayer If the peace reconciled the rest of his work and spoil corrupted all his work, the street wise was interested in this matter and put him provisions overlooked by many people these days became insulted him and do not pardon him, and do not know the rules and provisions approved by Shara, and the omission of one of these provisions is possible To lead to the invalidity of hi
... Show MoreGlobal warming has had considerable effects on vital ecosystems, which has also been caused by increased temperatures and CO2 that follow changes in different abiotic factors, which poses threats to mangrove forests environment. This research was conducted to examine the physiological and morphological characteristics of the Rhizophora apiculata mangrove regarding higher air temperature for the variety of tree species that respond to climate change. Seedlings were cultivated for three months in regulated growth chambers with three varying temperatures of 38°C, 21°C under CO2 at 450 ppm, and ambient CO2 concentration i.e., 450 ± 20 ppm under average temperature at 28°C as the control condition
... Show MoreThis paper deals the prediction of the process of random spatial data of two properties, the first is called Primary variables and the second is called secondary variables , the method that were used in the prediction process for this type of data is technique Co-kriging , the method is usually used when the number of primary variables meant to predict for one of its elements is measured in a particular location a few (because of the cost or difficulty of obtaining them) compare with secondary variable which is the number of elements are available and highly correlated with primary variables, as was the&nbs
... Show MoreWeb application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show More