The density-based spatial clustering for applications with noise (DBSCAN) is one of the most popular applications of clustering in data mining, and it is used to identify useful patterns and interesting distributions in the underlying data. Aggregation methods for classifying nonlinear aggregated data. In particular, DNA methylations, gene expression. That show the differentially skewed by distance sites and grouped nonlinearly by cancer daisies and the change Situations for gene excretion on it. Under these conditions, DBSCAN is expected to have a desirable clustering feature i that can be used to show the results of the changes. This research reviews the DBSCAN and compares its performance with other algorithms, such as the traditional number of clustering, K-mean particle swarm optimization (PSO), and Grey–Wolf optimization (GWO). This method offers high performance for improvement. The DBSCAN algorithm also offers better results of clusters and gives better performance assessment according to the results shown in this study.
The phenomena of Dust storm take place in barren and dry regions all over the world. It may cause by intense ground winds which excite the dust and sand from soft, arid land surfaces resulting it to rise up in the air. These phenomena may cause harmful influences upon health, climate, infrastructure, and transportation. GIS and remote sensing have played a key role in studying dust detection. This study was conducted in Iraq with the objective of validating dust detection. These techniques have been used to derive dust indices using Normalized Difference Dust Index (NDDI) and Middle East Dust Index (MEDI), which are based on images from MODIS and in-situ observation based on hourly wi
In the contemporary world, the security of data and privacy policies are major concerns in cloud computing. Data stored on the cloud has been claimed to be unsafe and liable to be hacked. Users have found it difficult to trust their data in the cloud. Users want to know that their data is accessible from anywhere and that an unauthorized user will not be able to access it. Another area of concern is the authentication of users over the cloud. There are a number of security concerns with Cloud Computing which include Distributed Denial of Service, Data leakage, and many more, just to mention a few. In this paper, an Elliptic Curve Cryptography (ECC) algorithm is used for the encryption and decryption of the information stored on
... Show MoreThe relationship between chronic hepatitis B virus and Helicobacter pylori infection was evaluated to determine, seventy five patients with chronic hepatitis B infection (8-70 years) were investigated. The results were compared with the results of 50 healthy volunteers. Anti-H. pylori antibodies IgA and IgG were measured by Indirect fluorescent antibody test (IFAT) in sera of patients and healthy groups. The percentage of anti-H.pylori IgA antibodies (26.67%) were significantly (P<0.01) higher than healthy control group. While, no significant difference was found between the percentages of anti-H. pylori IgG antibodies (48 %) in patient sera and these kind of antibodies in sera of healthy control group (P > 0.05). The present results indica
... Show MoreSome degree of noise is always present in any electronic device that
transmits or receives a signal . For televisions, this signal i has been to s the
broadcast data transmitted over cable-or received at the antenna; for digital
cameras, the signal is the light which hits the camera sensor. At any case, noise
is unavoidable. In this paper, an electronic noise has been generate on
TV-satellite images by using variable resistors connected to the transmitting cable
. The contrast of edges has been determined. This method has been applied by
capturing images from TV-satellite images (Al-arabiya channel) channel with
different resistors. The results show that when increasing resistance always
produced higher noise f
we studied the effect of low level laser therapy (LLLT) using diode laser with wavelength of (790-805) nm in promotion and enhancement of wound healing of episiotomy and to evaluate the analgesic effect of LLLT in reducing the pain sensation caused by the episiotomy wounds. Nineteen women with episiotomy wound were selected and divided into three groups; 1st group (group No.1: control group) given antibiotics without laser therapy, in the 2nd group (group No.2) the wounds were exposed to laser therapy (4 sessions, each session with energy density of 19.90 J /cm2 every other day ) and systemic antibiotics were prescribed for 1 week. In the 3rd group (group No.3) the wounds were exposed to laser therapy (4 sessions, the same as in the 2nd
... Show MoreObjective(s): This study aimed to evaluate job satisfaction among nurses working at primary health care centers in Samawa City.
Methodology: A Descriptive evolutional study has been carried out during the period from 1 February 2022 to 1 June 2022. A nonprobability (convenience) sample of (200) nurse were selected from different educational level. A questionnaire format is developed for the purpose of fulfilling the objectives of the study. Content validity of the questionnaire and reliability has been determined. Data are analyzed using IBM SPSS version 19 software (2010).
Results: The findings indicate that 52% of nurses are showing high level of job satisfa
... Show MoreThe gravity and magnetic data of Tikrit-Kirkuk area in central Iraq were considered to study the tectonic situation in the area. The residual anomalies were separated from regional using space windows method with space of about 24, 12 and 10km to delineate the source level of the residual anomalies. The Total Horizontal Derivative (THD) is used to identify the fault trends in the basement and sedimentary rocks depending upon gravity and magnetic data. The identified faults in the study area show (NW-SE), less common (NE-SW) and rare (N-S) trends. Some of these faults extending from the basement to the upper most layer of the sedimentary rocks. It was found that the depth of some gravity and magnetic source range 12-13Km, which confirm th
... Show MoreRecurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning al
... Show MoreStrong acids were determined via the precipitation reaction of loaded copper (II) ion on strong cation exchange resin which in turn reacts with potassium hyxacyano ferrate (II). The attenuation effect of formed precipitate Cu2 [Fe (CN) 6] on (0 -180o) incident LED light was measurement via homemade AYAH 5SX4-ST-5D solar CFI analyser. Optimum parameters were 0.005M.L-1 [Fe(CN)6]-4 , flow rate of 2.4 mL.min-1 , sample volume 204 μL , sample purge time of 64 seconds was chosen, and 1.6 V for light intensity. A liner calibration graph of 0.005 -0.2 M.L-1 were obtains for HCl, HNO3, HCLO4 and H2SO4, with a linearity (r2 %) 96 -97 % and L.O.D based on gradual dilution of lowest concentration in calibration graph was 37.19 μg for HCl, 64.273
... Show More