Fuzzy C-means (FCM) is a clustering method used for collecting similar data elements within the group according to specific measurements. Tabu is a heuristic algorithm. In this paper, Probabilistic Tabu Search for FCM implemented to find a global clustering based on the minimum value of the Fuzzy objective function. The experiments designed for different networks, and cluster’s number the results show the best performance based on the comparison that is done between the values of the objective function in the case of using standard FCM and Tabu-FCM, for the average of ten runs.
In the beta decay process, a neutron converts into a proton, or vice versa, so the atom in this process changes to a more stable isobar. Bethe-Weizsäcker used a quasi-experimental formula in the present study to find the most stable isobar for isobaric groups of mass nuclides (A=165-175). In a group of isobars, there are two methods of calculating the most stable isobar. The most stable isobar represents the lowest parabola value by calculating the binding energy value (B.E) for each nuclide in this family, and then drawing these binding energy values as a function of the atomic number (Z) in order to obtain the mass parabolas, the second method is by calculating the atomic number value of the most stable isobar (ZA). The results show
... Show MoreAdvances in digital technology and the World Wide Web has led to the increase of digital documents that are used for various purposes such as publishing and digital library. This phenomenon raises awareness for the requirement of effective techniques that can help during the search and retrieval of text. One of the most needed tasks is clustering, which categorizes documents automatically into meaningful groups. Clustering is an important task in data mining and machine learning. The accuracy of clustering depends tightly on the selection of the text representation method. Traditional methods of text representation model documents as bags of words using term-frequency index document frequency (TFIDF). This method ignores the relationship an
... Show MoreIn this paper, the 5 minutes measured wind speed data for year 2012 at 10 meter height for Tweitha have been statically analyzed to assess the time of wind turbine electrical power generation. After collection Tweitha wind data and calculation of mean wind speed the cumulative Weibull diagram and probability density function was ploted, then each of cumulative Weibull distribution, cut-in and furling turbine wind speed could be used as a mathematical input parameters in order to estimate the hours of electrical power generation for wind turbine during one day or one year. In Tweitha site, found that the average wind speed was (v= 1.76 m/s), so five different wind turbines were be selected to calculate hours of electrical generation for A
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreThis paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos
Ferritin is a key organizer of protected deregulation, particularly below risky hyperferritinemia, by straight immune-suppressive and pro-inflammatory things. , We conclude that there is a significant association between levels of ferritin and the harshness of COVID-19. In this paper we introduce a semi- parametric method for prediction by making a combination between NN and regression models. So, two methodologies are adopted, Neural Network (NN) and regression model in design the model; the data were collected from مستشفى دار التمريض الخاص for period 11/7/2021- 23/7/2021, we have 100 person, With COVID 12 Female & 38 Male out of 50, while 26 Female & 24 Male non COVID out of 50. The input variables of the NN m
... Show MorePraise be to God, Lord of the Worlds, and prayers and peace be upon the Master of Messengers, Muhammad, and upon God
The evil of the scholars of jurisprudence is that the reciter and the reciter must have attained the aspects of good grammar and morphology so that he does not make mistakes in the matters of jurisprudence according to the seven readers and others, and they require phonetic, morphological, and grammatical explanations, and this is called aqeed.
Our ancient scholars are known for knowledge and it is linked to narration, and our topic is studied from both sides of narration and knowledge, as it is one of the topics of fundamentals.
The seven readers and others, and his relationship is clear and close
... Show MoreString matching is seen as one of the essential problems in computer science. A variety of computer applications provide the string matching service for their end users. The remarkable boost in the number of data that is created and kept by modern computational devices influences researchers to obtain even more powerful methods for coping with this problem. In this research, the Quick Search string matching algorithm are adopted to be implemented under the multi-core environment using OpenMP directive which can be employed to reduce the overall execution time of the program. English text, Proteins and DNA data types are utilized to examine the effect of parallelization and implementation of Quick Search string matching algorithm on multi-co
... Show MoreBackground; determining what radiologic studies to obtain following the diagnosis of a urinary tract infection(uti) is an area of medicine that is still not agreed upon, nor is there a gold standard.
Objective; to study the radiological abnormalities in paediatric patients with urinary tract infections.
Patients and methods; this prospective study was done from the first of june 2008 to the first of may 2009 include 104 pediatric patients who were referred to children welfare hospital ,(pediatric nephrological out patient clinic) with signs and symptoms of urinary tract infections, all of them had culture positive urine examination , ultrasonograhy was done for all patients, voiding cystouretherography was done for patients with re