The electrical insulation of the manufacture sulfonated phenol-formaldehyde viscous material (product) has been studied with Polyvinyl-acetate (PVA) and toluene diisocyanate (TDI) blend has been prepared by fixing percentage by weight 3:1 and mixed with different percentages by weight of the product sulfonated phenol formaldehyde viscous mass (SPF). The Fourier transform infrared (FTIR) spectroscopy is done on (SPF) resin powder and prepared film of PVA-TDI-SPF viscous mass. The quality factor (Q), dissipation factor (D), parallel resistance (Rp), series resistance (Rs), parallel capacitance (Cp), series capacitance (Cs) and phase shift (?) are measured. The calculated maximum dielectric constant (??) is 3.49x107 at sample (1) wt.1% SPF vis
... Show MoreThe current study examined the effect of different sample sizes to detect the Item differential functioning (DIF). The study has used three different sizes of the samples (300, 500, 1000), as well as to test a component of twenty polytomous items, where each item has five categories. They were used Graded Response Model as a single polytomous item response theory model to estimate items and individuals’ parameters. The study has used the Mantel-Haenszel (MH) way to detect (DIF) through each case for the different samples. The results of the study showed the inverse relationship between the sample size and the number of items, which showed a differential performer.
Mining association rules is a popular and well-studied method of data mining tasks whose primary aim is the discovers of the correlation among sets of items in the transactional databases. However, generating high- quality association rules in a reasonable time from a given database has been considered as an important and challenging problem, especially with the fast increasing in database's size. Many algorithms for association rules mining have been already proposed with promosing results. In this paper, a new association rules mining algorithm based on Bees Swarm Optimization metaheuristic named Modified Bees Swarm Optimization for Association Rules Mining (MBSO-ARM) algorithm is proposed. Results show that the proposed algorithm can
... Show MoreA network (or formally a graph) can be described by a set of nodes and a set of edges connecting these nodes. Networks model many real-world phenomena in various research domains, such as biology, engineering and sociology. Community mining is discovering the groups in a network where individuals group of membership are not explicitly given. Detecting natural divisions in such complex networks is proved to be extremely NP-hard problem that recently enjoyed a considerable interest. Among the proposed methods, the field of evolutionary algorithms (EAs) takes a remarkable interest. To this end, the aim of this paper is to present the general statement of community detection problem in social networks. Then, it visits the problem as an optim
... Show MoreExcessive skewness which occurs sometimes in the data is represented as an obstacle against normal distribution. So, recent studies have witnessed activity in studying the skew-normal distribution (SND) that matches the skewness data which is regarded as a special case of the normal distribution with additional skewness parameter (α), which gives more flexibility to the normal distribution. When estimating the parameters of (SND), we face the problem of the non-linear equation and by using the method of Maximum Likelihood estimation (ML) their solutions will be inaccurate and unreliable. To solve this problem, two methods can be used that are: the genetic algorithm (GA) and the iterative reweighting algorithm (IR) based on the M
... Show MoreThe data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Process
... Show MoreItem Difficulty and Item Discrimination Coefficient for School and College Ability Tests (SCAT) Advanced Form in Classical Test Theory (CTT) and Item Response Theory (IRT) and the Correlation among Them Mohammad moqasqas Haifa T. Albokai Assistant Professor of Measurement and Evaluation Associate Professor of Measurement and Evaluation College of Education, Taibah University The aim of this study was to study the item difficulty and item discrimination of the SCAT (advance form) with CTT, and IRT, and to study the correlation among them. To do this, the researchers used the data of their previous study, which conducted in (2011). It consisted of (3943) subject. Then, they used two-statistical programs (TAP, Bilog-MG-3) to obtain the item
... Show MoreOne of the recent significant but challenging research studies in computational biology and bioinformatics is to unveil protein complexes from protein-protein interaction networks (PPINs). However, the development of a reliable algorithm to detect more complexes with high quality is still ongoing in many studies. The main contribution of this paper is to improve the effectiveness of the well-known modularity density ( ) model when used as a single objective optimization function in the framework of the canonical evolutionary algorithm (EA). To this end, the design of the EA is modified with a gene ontology-based mutation operator, where the aim is to make a positive collaboration between the modularity density model and the proposed
... Show More