Association rules mining (ARM) is a fundamental and widely used data mining technique to achieve useful information about data. The traditional ARM algorithms are degrading computation efficiency by mining too many association rules which are not appropriate for a given user. Recent research in (ARM) is investigating the use of metaheuristic algorithms which are looking for only a subset of high-quality rules. In this paper, a modified discrete cuckoo search algorithm for association rules mining DCS-ARM is proposed for this purpose. The effectiveness of our algorithm is tested against a set of well-known transactional databases. Results indicate that the proposed algorithm outperforms the existing metaheuristic methods.
Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse
... Show MoreNowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreThe issues of journalists and media employees in general and photojournalists in particular have become important issues, especially as those issues are closely linked to the success or failure of the media process.
This research deals with (the issues of Iraqi photojournalists working in local and foreign institutions in Iraq - a case study in 2012), because of the ambiguity in identifying those issues, which focused on the issues of this research.
This was done through the research community of members of the Association of Iraqi photojournalists in Baghdad exclusively of (64) photographers and television photographers to identify the problems encountered in their work
... Show MoreThe research aims to diagnose the causes of the phenomenon of Marketing deception catalog, which is now deployed in the Iraqi market and related to producers and marketers, consumers, regulators and other institutions) and their impact in the areas of prejudice to the consumer protection (product and signifying specifications, price, advertising, packaging), as well as identify differences in the sample responses according to personal variables, it has been the adoption of the resolution as a tool to collect data and information through a sample survey of consumer opinions totaling 108 people in shopping centers in the province of Baghdad and in the Karkh and Rusafa, It was the use of methods selected statistical represented by the arith
... Show MoreThe aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter sys
... Show MoreBackground : Diabetes mellitus, also known as blood sugar, is a series of metabolic disorders described by high blood glucose levels (hyperglycemia), low blood glucose (hypoglycemia), or both, resulting from defects in insulin production, insulin action, or both. Numerous studies have shown that interleukin (IL-6) acts on skeletal muscle cells , liver cells, and pancreas cells to influence glucose balance and metabolism, which directly or indirectly contributes to the development of diabetes. Research in this area is crucial because diabetes is recognized as a major risk factor for many diseases like Diabetic retinopathy, Diabetic nephropathy, Diabetic Neuropathy , heart disease and others. Patients and methods : In this study, we
... Show MoreBackground: Both bladder cancer and schistosomiasis are endemic in Egypt. The former has a unique epidemiological pattern, which has been linked to bladder infestation by Schistosoma. The last decades have witnessed a great reduction in the infection rate of schistosomiasis and a decline in the incidence and changes in the patterns of bladder cancer. Whether these changes are linked to each other or a co-incidence is a subject of investigations.
Method: Literature on epidemiological data of bladder cancer and Schistosoma in Egypt was searched for in Medline, Scopus, PubMed, and Google Scholar. Furthermore, a hand search for literature and reports released by the Egyptian government and involved agencies was perfo
... Show MoreThis study was conducted in Al-Salam station for Dairy cattle/private sector, for the period from 1-11-2016 to 1-11-2017, to determine the association between BTN1A1 gene polymorphism and reproductive efficiency indicator and heat tolerance in 50 Holstein cows. The results of BTN1A1 gene analysis showed a highly significant Different (P<0.01) between genotypes of BTN1A1 gene’s genotypes AA, AB the percentage were 72.00, 28.00 % respectively. Results showed that services per conception and days open was significantly (P<0.05) affected by polymorphism of BTN1A1 gene and for cows with AA genotype, there was also a significant difference (P<0.05) between the genotypes of BTN1A1 gene for IgG concentration in calves blood who belong to mother
... Show More