Data mining is a data analysis process using software to find certain patterns or rules in a large amount of data, which is expected to provide knowledge to support decisions. However, missing value in data mining often leads to a loss of information. The purpose of this study is to improve the performance of data classification with missing values, precisely and accurately. The test method is carried out using the Car Evaluation dataset from the UCI Machine Learning Repository. RStudio and RapidMiner tools were used for testing the algorithm. This study will result in a data analysis of the tested parameters to measure the performance of the algorithm. Using test variations: performance at C5.0, C4.5, and k-NN at 0% missing rate, performance at C5.0, C4.5, and k-NN at 5–50% missing rate, performance at C5.0 + k-NNI, C4.5 + k-NNI, and k-NN + k-NNI classifier at 5–50% missing rate, and performance at C5.0 + CMI, C4.5 + CMI, and k-NN + CMI classifier at 5–50% missing rate, The results show that C5.0 with k-NNI produces better classification accuracy than other tested imputation and classification algorithms. For example, with 35% of the dataset missing, this method obtains 93.40% validation accuracy and 92% test accuracy. C5.0 with k-NNI also offers fast processing times compared with other methods.
Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del
... Show MoreGreen areas are an essential component of city planning, as they serve as an outlet for them to spend their free time, in addition to the environmental role that these green areas play in improving the city’s climate by purifying the air and beautifying the city. The study’s problem is summarized in identifying the appropriateness of the current spatial distribution of green areas in the city of Najaf with the current population densities and the pattern in which green areas are distributed using GIS and knowing the per capita share of those green areas in the city, the research assumes that the inconsistency of spaces between regions Green and residential neighbourhoods need to c
Abstract The aim of this research is to show the grade of implementation of ISO 26000 (Social Responsibility Standard), specifically which related in clause sex (consumer issues), this study was achieved in Market Research and Consumer Protection Center (MRCPC) / University of Baghdad. The seven consumer issues of ISO 26000 was analyzed to show the extent of its implementation in MRCPC depending of using a check list as a principle instrument to collect research data and information. Results analysis was achieved by percentages and mean average. The research was leaded some of results and the most importance one was that the grade of implementation of the center in related to consumer issues given in the standard was medium
The issues of journalists and media employees in general and photojournalists in particular have become important issues, especially as those issues are closely linked to the success or failure of the media process.
This research deals with (the issues of Iraqi photojournalists working in local and foreign institutions in Iraq - a case study in 2012), because of the ambiguity in identifying those issues, which focused on the issues of this research.
This was done through the research community of members of the Association of Iraqi photojournalists in Baghdad exclusively of (64) photographers and television photographers to identify the problems encountered in their work
... Show MoreThis study uses load factor and loss factor to determine the power losses of the electrical feeders. An approach is presented to calculate the power losses in the distribution system. The feeder’s technical data and daily operation recorded data are used to calculate and analyze power losses.
This paper presents more realistic method for calculating the power losses based on load and loss factors instead of the traditional methods of calculating the power losses that uses the RMS value of the load current which not consider the load varying with respect to the time. Eight 11kV feeders are taken as a case study for our work to calculate load factor, loss factor and power losses. Four of them (F40, F42, F43 and F
... Show MoreThe aim of this research is to study the extent of the impact of government funding decisions on the financial performance of the directorate of Diyala province. The research problem was based on the financial reality of the directorate, and the data were collected from the financial divisions, planning and follow-up, implementation, and engineers of the resident engineer departments. Demonstrate the impact of government funding decisions on financial performance. Using scientific methods in estimating their financial needs through the annual estimated budget. The use of financial analysis to assess the performance of the Directorate, for the purpose of assessing the financial situation of the Directorate of research. The researc
... Show MoreIn the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreBilosomes are nanocarriers that contain bile salts in their vesicular bilayer, thereby enhancing their flexibility and durability in the gastrointestinal tract. Unlike conventional vesicular systems they provide distinct advantages such as streamlined manufacturing procedures, cost efficiency, and improved stability. The main objective of this study was to attain a comparison of the pharmacokinetic parameters of nisoldipine (NSD) after administering an ordinary NSD suspension and an NSD-loaded bilosome suspension. The study used 60 Swiss albino rats weighing 200±15 g and divided into two groups (n=30 each). A dose of 2.2 mg/kg of NSD was administered from the ordinary NSD suspension to the rats of the first group and the same dose
... Show More