The increasing amount of educational data has rapidly in the latest few years. The Educational Data Mining (EDM) techniques are utilized to detect the valuable pattern so that improves the educational process and to obtain high performance of all educational elements. The proposed work contains three stages: preprocessing, features selection, and an active classification stage. The dataset was collected using EDM that had a lack in the label data, it contained 2050 records collected by using questionnaires and by using the students’ academic records. There are twenty-five features that were combined from the following five factors: (curriculum, teacher, student, the environment of education, and the family). Active learning had been utilized in the classification. Four techniques had been applied for classifying the features: Random Forest (RF) algorithm, Label Propagation (LP), Logistic Regression (LR), and Multilayer Perceptron (MLP). The accuracies of prediction were 95.121%, 92.195%, 92.292%, and 93.951% respectively. Also, the RF algorithm has been utilized for assorting the features depending on their importance.
Survival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms re
... Show MoreAlhagi maurorum (camel thorn) is a grayish, evergreen, deeply rooting plant that has spiny needle -like branches. In our study, the phytochemical contents of the root ethanoloic extract of A. maurorum were determined by using gas chromatography-mass spectroscopy (GC-MS). Thirty two chemical constituents were identified. We revealed the existence of oxalic acid, anti-2 acetoxyacetaldoxime, sulfone, butyl isopropyl, 2,3-pentanedione, 2-butanone, n,n,o triacetylhydroxylamine. di(1,2,5-oxadiazole)[3,4-b;3,4-e]pyrazine, isobutane,3,4-hexanedione,3-hexanone, pentane, 3-pentanone, 3-butene, 2-thiopheneacetic acid, 2-pyrazoline, 4-hepten-3-onemethylphosphonic acid, butane, propanoic acid, methane, azetidine, heptane, butanoic a
... Show More
Shear and compressional wave velocities, coupled with other petrophysical data, are vital in determining the dynamic modules magnitude in geomechanical studies and hydrocarbon reservoir characterization. But, due to field practices and high running cost, shear wave velocity may not available in all wells. In this paper, a statistical multivariate regression method is presented to predict the shear wave velocity for Khasib formation - Amara oil fields located in South- East of Iraq using well log compressional wave velocity, neutron porosity and density. The accuracy of the proposed correlation have been compared to other correlations. The results show that, the presented model provides accurate
... Show MoreThis study deals with the interpretation of structural 3D seismic reflection of the Kumait oil field in southern Iraq within the administrative boundaries of the Maysan Governorate. Synthetic seismograms are prepared by using available data of the Kt-1 oil field by using Petrel software to define and pick the reflector on the seismic section of the Zubair Formation, Which represents the Cretaceous Age. The study shows that the Kumait structure is an anticline fold. It is thought to be a structure trap caused by the collision of the Arabian and Iranian plates and trending in the same direction as driving factors in the area, which are from the northwest to the southeast, and the overall trend of strata is north and northeast. Sei
... Show MoreThis research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa
... Show MoreTight reservoirs have attracted the interest of the oil industry in recent years according to its significant impact on the global oil product. Several challenges are present when producing from these reservoirs due to its low to extra low permeability and very narrow pore throat radius. Development strategy selection for these reservoirs such as horizontal well placement, hydraulic fracture design, well completion, and smart production program, wellbore stability all need accurate characterizations of geomechanical parameters for these reservoirs. Geomechanical properties, including uniaxial compressive strength (UCS), static Young’s modulus (Es), and Poisson’s ratio (υs), were measured experimentally using both static and dynamic met
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.