Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreA new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte
... Show MoreArtificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing flower pollination algorithm in the environmental field to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement. We estimate the regression function of the semi-parametric model by estimating the parametric model and estimating the non-parametric model, the parametric model is estimated by using an instrumental variables method (Wald method, Bartlett’s method, and Durbin
... Show MoreThe objective of the current research is to find an optimum design of hybrid laminated moderate thick composite plates with static constraint. The stacking sequence and ply angle is required for optimization to achieve minimum deflection for hybrid laminated composite plates consist of glass and carbon long fibers reinforcements that impeded in epoxy matrix with known plates dimension and loading. The analysis of plate is by adopting the first-order shear deformation theory and using Navier's solution with Genetic Algorithm to approach the current objective. A program written with MATLAB to find best stacking sequence and ply angles that give minimum deflection, and the results comparing with ANSYS.
Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a
... Show MoreThe Electric Discharge (EDM) method is a novel thermoelectric manufacturing technique in which materials are removed by a controlled spark erosion process between two electrodes immersed in a dielectric medium. Because of the difficulties of EDM, determining the optimum cutting parameters to improve cutting performance is extremely tough. As a result, optimizing operating parameters is a critical processing step, particularly for non-traditional machining process like EDM. Adequate selection of processing parameters for the EDM process does not provide ideal conditions, due to the unpredictable processing time required for a given function. Models of Multiple Regression and Genetic Algorithm are considered as effective methods for determ
... Show MoreOxidative stress markers are of important diagnostic parameters for many disorders including cholelithiasis. This present study has aimed to assess the state of oxidative stress in symptomatic radiographically confirmed (Cholelithiasis) patients by measuring two parameters used as oxidative stress parameters which are serum myeloperoxidase (MPO) and superoxide dismutase (SOD). This study was carried out on 100 patient diagnosed as (Cholelithiasis) patients with 30 age and sex matched healthy controls by measuring serum (MPO) and (SOD) by ELIZA technique .Results showed significantly decrease in antioxidant enzyme(SOD) and increase in serum level of (MPO) comparing with controls.
Keywords: Cholelithiasis , Oxidative stress
... Show MoreBackground: - This study was carried out to investigate the ability of Streptococcus bovis to colonise colorectal cancer.
Patients and Methods: - A total of 106 outpatients were subjected for colonscopy. Carcinoma biopsies from patients with colorectal cancer tissue from patient with polyps and normal mucosa stool and blood from all patient and controls were cultured and identified for S.bovis.
Results: - The histopatholgical findings confirmed that 38 patients had colorectal carninoma, 27 patients with benign polyps and 41 with normal colonic mucosa. The faecal carriage rate of S.bovis was 15(39.5%) in patient with colorected cancer, 5(18.5%) in patients with polyp and 7(17.1%) in control.
Conclusion: -
Background: Genetic factors play an important role in susceptibility to Guillain Barre' syndrome. Human leukocyte antigen (HLA) as part of immune system has a role in the disease process.Aim of the study: to assess the relationship between HLA-A alleles with Guillain Barre' syndrome (GBS) compared with a healthy control group using PCR-SSOP method.Type of the study: Cross-sectional study.Patients and methods:Patient's group consisted of 30 Iraqi Arab Muslims patients with Guillain Barre' syndrome that consulted the Neurological department in Neurosciences Hospital between January-2013 to January- 2014 were genotyped for HLA-A alleles. A control group consisted of 30 healthy volunteers among the staff of AL-Kindi College of Medicine that
... Show MoreBackground: Helicobacter pylori (H. pylori) infection is associated with gastritis and may induce atrophic gastritis have specific circulating immunoglobulin G (IgG) antibodies.
Aim of the study: To confirm the correlation between Helicobacter pylori infection and gastric atrophy.
Patient and Method: A study was conducted in the period between December 2005 and March 2006 on 25 patients with atrophic gastritis attending Gastroenterology and Hepatology Teaching Hospital in Baghdad, and 25 healthy volunteers who agreed to donate blood. Sera were tested for H. pylori IgG Ab by ELISA test.
Results and Conclusions: detection of H. pylori IgG Ab were applied to each individual, showed that (92 %) of patie