The density-based spatial clustering for applications with noise (DBSCAN) is one of the most popular applications of clustering in data mining, and it is used to identify useful patterns and interesting distributions in the underlying data. Aggregation methods for classifying nonlinear aggregated data. In particular, DNA methylations, gene expression. That show the differentially skewed by distance sites and grouped nonlinearly by cancer daisies and the change Situations for gene excretion on it. Under these conditions, DBSCAN is expected to have a desirable clustering feature i that can be used to show the results of the changes. This research reviews the DBSCAN and compares its performance with other algorithms, such as the traditional number of clustering, K-mean particle swarm optimization (PSO), and Grey–Wolf optimization (GWO). This method offers high performance for improvement. The DBSCAN algorithm also offers better results of clusters and gives better performance assessment according to the results shown in this study.
The research aims to analyze and evaluate the urban land use according to the needs of the current and future population by adopting the planning criteria for the holy city of Karbala. In the theoretical side, we discussed the most important concepts of urban land use planning. In the practical aspect of the study, field surveys were conducted to obtain the required information. Using the GIS program, the land uses were planned and executed, Analysis By comparing the per capita use of urban land with criteria and the production of maps.
The main findings of the study are that there is a large deficit in meeting some of the needs of the urban land uses and the basic services of the city. The research recommended that the needs of
... Show MoreThe current study presents the simulative study and evaluation of MANET mobility models over UDP traffic pattern to determine the effects of this traffic pattern on mobility models in MANET which is implemented in NS-2.35 according to various performance metri (Throughput, AED (Average End-2-end Delay), drop packets, NRL (Normalize Routing Load) and PDF (Packet Delivery Fraction)) with various parameters such as different velocities, different environment areas, different number of nodes, different traffic rates, different traffic sources, different pause times and different simulation times . A routing protocol.…was exploited AODV(Adhoc On demand Distance Vector) and RWP (Random Waypoint), GMM (Gauss Markov Model), RPGM (Refere
... Show More
The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra
... Show MoreBackground: Hyperthyroidism is a serious public concern, due the continuous increase in its prevalence and its impact on the mortality rates. Autoimmune hyperthyroidism is seen as a thyroid gland problem. Pro-inflammatory cytokines are crucial for the growth and development of hyperthyroidism, it was shown that the level of several pro-inflammatory cytokines were higher in the hyperthyroidism patients. Objective: This work was aimed to assessment the concentration of certain cytokine in hyperthyroid patients. Materials and Methods: Sixty hyperthyroidism patients and 30 healthy individuals with age range from (30-65) years old were enrolled in this study through their presence at the National Center for Diabetes Treatment and Research in Bag
... Show MoreFor more than a decade, externally bonded carbon fiber reinforced polymer (CFRP) composites successfully utilized in retrofitting reinforced concrete structural elements. The function of CFRP reinforcement in increasing the ductility of reinforced concrete (RC) beam is essential in such members. Flexural and shear behaviors, ductility, and confinement were the main studied properties that used the CFRP as a strengthening material. However, limited attention has been paid to investigate the energy absorption of torsion strengthening of concrete members, especially two-span concrete beams. Hence, the target of this work is to investigate the effectiveness of CFRP-strengthening technique with regard to energy absorption of two-span RC
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show MoreXXXX
In the present work the performance of semifluidized bed adsorber was evaluated for removal of phenolic compound from wastewater using commercial activated carbon as adsorbent. P-chlorophenol (4-Chlorophenol) and o-cresol (2-methylphenol) was selected as a phenolic compound for that purpose. The phenols percent removal, in term of breakthrough curves were studied as affected by hydrodynamics limitations which include minimum and maximum semifluidization velocities and packed bed formation in the column by varying various parameters such as inlet liquid superficial velocity (from Uminsf to 8Uminsf m/s), and retaining grid (sometimes referred to as adsorbent loading) to initial static bed height ratio (from 3-4.5). In
... Show MoreAim: To evaluate the cytotoxic activity of newly synthesized a series of novel HDAC inhibitors comprising sulfonamide as zinc binding group and Isatin derivatives as cap group joined by mono amide linker as required to act as HDAC inhibitors. Materials and Methods: The utilization of sulfonamide as zinc binding group joined by N-alkylation reaction with ethyl-bromo hexanoate as linker group that joined by amide reaction with Isatin derivatives as cap groups which known to possess antitumor activity in the designed of new histone deacetylase inhibitors and using the docking and MTT assay to evaluate the compounds. Results: Four compounds have been synthesized and characterized successfully by ART-FTIR, NMR and ESI-Ms. the compounds w
... Show More