The density-based spatial clustering for applications with noise (DBSCAN) is one of the most popular applications of clustering in data mining, and it is used to identify useful patterns and interesting distributions in the underlying data. Aggregation methods for classifying nonlinear aggregated data. In particular, DNA methylations, gene expression. That show the differentially skewed by distance sites and grouped nonlinearly by cancer daisies and the change Situations for gene excretion on it. Under these conditions, DBSCAN is expected to have a desirable clustering feature i that can be used to show the results of the changes. This research reviews the DBSCAN and compares its performance with other algorithms, such as the traditional number of clustering, K-mean particle swarm optimization (PSO), and Grey–Wolf optimization (GWO). This method offers high performance for improvement. The DBSCAN algorithm also offers better results of clusters and gives better performance assessment according to the results shown in this study.
Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi
... Show MoreTwelve species from Brassicaceae family were studied using two different molecular techniques: RAPD and ISSR; both of these techniques were used to detect some molecular markers associated with the genotype identification. RAPD results, from using five random primers, revealed 241 amplified fragments, 62 of them were polymorphic (26%).
ISSR results showed that out of seven primers, three (ISSR3, UBC807, UBC811) could not amplify the genomic DNA; other primers revealed 183 amplified fragments, 36 of them were polymorphic (20%). The similarity evidence and dendrogram for the genetic distances of the incorporation between the two techniques showed that the highest similarity was 0.897 between the va
... Show MoreThe liver diseases can define as the tumor or disorder that can affect the liver and causes deformation in its shape. The early detection and diagnose of the tumor using CT medical images, helps the detector to specify the tumor perfectly. This search aims to detect and classify the liver tumor depending on the use of a computer (image processing and textural analysis) helps in getting an accurate diagnosis. The methods which are used in this search depend on creating a binary mask used to separate the liver from the origins of the other in the CT images. The threshold has been used as an early segmentation. A Process, the watershed process is used as a classification technique to isolate the tumor which is cancer and cyst.
 
... Show MoreThe Climatic parameters for the years (1985-2015) were collected from Baghdad
meteorological station and then were applied to evaluate the climatic conditions for
the Al-Yusufyiah area south Baghdad. The total annual rainfall is (119.65 mm),
while the total annual evaporation is (3201.7 mm), relative humidity is (43.62%),
sunshine (8.76 h/day), temperature (23.28 C◦) and wind speed (3.06 m/sec). Climate
of the study area is described as an arid according to classification of (Kettaneh and
Gangopadhyaya, 1974), (Mather, 1973), and (Al-Kubaisi, 2004). Mean monthly
water surplus for the period (1985-2015) was recorded in the study area about (4.7
mm) in November, (11.67 mm) in December, (20.56 mm) in January and (6
Find the impediments Activity vital and important, but focuses a bancassurance activity, diagnosis and its impact on the financial ratios indicators for insurance companies. The researcher has adopted in his research on several financial ratios used to analyze the financial performance of a (relative profitability, liquidity ratio and the ratio of solvency) of the company Iraqi insurance for a period of one year (2009) to a year (2015), based on the annual reports and financial statements (balance sheet revealed income), financial statements for insurance premiums for banks research sample of this research has addressed several topics of theoretical and practical body through which the researcher obstacles to banking and insurance experi
... Show MoreIn earthquake engineering problems, uncertainty exists not only in the seismic excitations but also in the structure's parameters. This study investigates the influence of structural geometry, elastic modulus, mass density, and section dimension uncertainty on the stochastic earthquake response of a multi-story moment resisting frame subjected to random ground motion. The North-south component of the Ali Gharbi earthquake in 2012, Iraq, is selected as ground excitation. Using the power spectral density function (PSD), the two-dimensional finite element model of the moment resisting frame's base motion is modified to account for random ground motion. The probabilistic study of the moment resisting frame structure using stochastic fin
... Show MoreThis research is an attempt to explore a social and pragmatic phenomenon of lamentation in elegies of Gray and AL-Khansaa' who represent two different cultures. It illustrates the intended meaning of lamentation in English and Arabic and finds how the two languages express this purpose of poetry by analysing it socio-pragmatically adopting Searle's models (1969),and its modifications. Lamentation is considered as a mournful poem lamenting the death of whole humanity as Gray's elegy and of an individual as AL-Khansaa's elegy. So, Gray portrays a universal picture concerning his lamentation, while AL-Khansaa' portrays an individual and subjective picture regarding her lamentation. As branches of linguistics, sociolinguistics de
... Show MoreDue to the scientific and technical development in the free electron laser devices and the accompanying industrial and technological progress in various fields of civil and military life, it became necessary to expand the understanding of the mechanism of interaction of electrons (as an effective medium) with the magnetic field that they pass through to form coherent photons.
In this paper, the Lorentz force effect is simulated and analysed. The results showed that the Lorentz force originates from the magnetic field, making the electron move through it oscillate. This sinusoidal motion of the electron causes it to emit two photons for every electron wavelength. It has been concluded that the electron velocity directly affe
... Show MoreThe biological diversity of Klebsiella pneumoniae (K. pneumoniae) has widely been reported to be associated with pathological progress in severe nosocomial and community-acquired infections. 250 clinical specimens included sputum, urine and swabs from wound and burns samples were collected from Al-Batool Teaching Hospital (38.4%), Baqubah Teaching Hospital (61.6%) and private laboratories in Baqubah and Diyala, Iraq. Positive rates of nosocomial acquired infection were sputum 98%, urine 96%, and swabs from wound and burns 94%, while positive rates of community acquired infection were sputum 60%, urine 60%, and swabs wound and burns 30%. Positive rates of nosocomial and community acquired infections were 96% and 48%, res
... Show MoreNowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More