Due to the increased of information existing on the World Wide Web (WWW), the subject of how to extract new and useful knowledge from the log file has gained big interest among researchers in data mining and knowledge discovery topics.
Web miming, which is a subset of data mining divided into three particular ways, web content mining, web structure mining, web usage mining. This paper is interested in server log file, which is belonging to the third category (web usage mining). This file will be analyzed according to the suggested algorithm to extract the behavior of the user. Knowing the behavior is coming from knowing the complete path which is taken from the specific user.
Extracting these types of knowledge required many of KDD (Knowledge Discovery in Database) steps such as preprocessing, pattern discovery, and pattern analysis. After that, the complete graph of the visited web will be drawn. The knowledge discussed in this paper, helps the web designers to improve their web site design and helps to improve their website usability and visitor’s browsing experience by determining related link connections in the website.
Modal verbs are also called auxiliary verbs, helping verbs and modal auxiliaries. They are special auxiliary verbs that express the degree /of certainty of the action in the sentence, attitude or opinion of the writer concerning the action. These auxiliary verbs are can, could ,may, might, must, ought to, shall, should, will, would and had better. Modality is one of the most difficult aspects of learning English, because the form of modals does not follow the conventional rules of grammar, and there are so many meanings of modals that students often get confused about which modal to use. Also, many EFL learners face difficulty in choosing the proper modal verb that fit certain situations because each modal verb has many functions. The pr
... Show MoreTo ensure that a software/hardware product is of sufficient quality and functionality, it is essential to conduct thorough testing and evaluations of the numerous individual software components that make up the application. Many different approaches exist for testing software, including combinatorial testing and covering arrays. Because of the difficulty of dealing with difficulties like a two-way combinatorial explosion, this brings up yet another problem: time. Using client-server architectures, this research introduces a parallel implementation of the TWGH algorithm. Many studies have been conducted to demonstrate the efficiency of this technique. The findings of this experiment were used to determine the increase in speed and co
... Show MoreBackground: The occurrence of seizures in bacterial meningitis is important, as it has been reported to increase the risk of complications; however, its frequency and predictors are not well studied yet. Objective: To assess the frequency, clinical, and biochemical predictors of seizures in children with acute bacterial meningitis. Method: A cross-sectional study recruited confirmed acute bacterial meningitis cases based on positive CSF culture and sensitivity among children aged 2 months to 15 years admitted to the Central Child Teaching Hospital emergency department in Iraq. Patients were divided into two groups based on seizure at presentation time. Demographic characteristics [age, gender, residence, duration of fever and disease, prese
... Show MoreIncreasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authen
... Show MoreThe identification of a bed’s lithology is fundamental to all reservoir characterization because the physical and chemical properties of the rock that holds hydrocarbons and/or water affect the response of every tool used to measure formation properties. The main purpose of this study is to evaluate reservoir properties and lithological identification of Nahr Umr Formation in Luhais well -12 southern Iraq. The available well logs such as (sonic, density, neutron, gamma ray, SP, and resistivity logs) are digitized using the Didger software. The petrophysical parameters such as porosity, water saturation, hydrocarbon saturation, bulk water volume, etc. were computed and interpreted using Techlog software. The lithology prediction of Nahr
... Show MoreAudio security is an important aspect in various areas of communication. This paper deals with audio encryption as many of the data communication depends on audio data. In this paper, a new proposal of audio encryption system has been introduced. The system can be divided into two phases, the first phase focuses on generating a high-quality Pseudo Random Number generator (PRNGs) using elementary, periodic and hybrid rules of cellular automata (CA). The system suggests a new combination of CA rules in an endeavor to provide high randomness and to improve the strength of the proposed cryptosystem. Whereas the second phase produces the Enhanced Rivest Cipher 5 (ERC5) algorithm which employs the generated Random Number Sequence (RNS) i
... Show MoreForty lower premolars with single root canals prepared with ProtaperNext files to size 25, and obturated with GP/sealer using lateral compaction. Teeth divided randomly into four groups (group n=10). Protaper universal retreatment kit (PUR), D-Race desobturation files (DRD), R-Endo retreatment kit (RE) and Hedstrom (H) files (control) were used to remove GP/sealer in each group. Removal effectiveness assessed by measuring the GP /sealer remnants in the roots after sectioning them into two halves. Stereomicroscope with a digital camera used to capture digital images. Images processed by ImageJ software to measure the percentage of GP/sealer remnants surface area in total, coronal, middle and apical areas of the canal. In the coronal area,
... Show MoreDigital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.