The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
The leaves of globe artichoke, Cynara scolymus Family Asteraceae/ compositea have long – used in traditional medicine and now included in British and European Pharmacopeia, the British Harbal Pharmacopeia and complete German Commission E monographs.The plant originally comes from Mediterranean region and North Africa and cultivated around the world. The flowers are used worldwide for nutrition purposes and the leaves for medical purposes including hepatic affections. The plant wildly distributed in Iraq in the watery lines and boundary of the field.The plant contains many phytochemicals such as the bitter phenolic acids whose choleretic and hypocholestremic as these compounds are antioxidant. Other materials to h
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreMillions of pilgrims and visitors from numerous parts of the world flock to Karbala (one of the most prominent ideological and religious places in central Iraq) each year to visit the holy shrines in Karbala due to their sanctity. Many improvements have been made to the Two Holy Shrines (THS), the Shrines of Imam Husayn and Imam Abbas, and the area between them (ATHS), due to the high temperatures in this region and to improve pedestrian thermal comfort. Studies on improving outdoor thermal comfort in Karbala are scarce. Hence, this research aims to look into historical and current architectural changes and how they affect thermal comfort. On the hottest summer day, the ENVI-met software program was used to simulate the building des
... Show MoreMillions of pilgrims and visitors from numerous parts of the world flock to Karbala (one of the most prominent ideological and religious places in central Iraq) each year to visit the holy shrines in Karbala due to their sanctity. Many improvements have been made to the Two Holy Shrines (THS), the Shrines of Imam Husayn and Imam Abbas, and the area between them (ATHS), due to the high temperatures in this region and to improve pedestrian thermal comfort. Studies on improving outdoor thermal comfort in Karbala are scarce. Hence, this research aims to look into historical and current architectural changes and how they affect thermal comfort. On the hottest summer day, the ENVI-met software program was used to simulate the building des
... Show Moret. The current study was conducted on the umbilical cord blood of newborns in the Banks Hospital in Baghdad, Diyala, and Khalis in Diyala, where the study included 90 samples of blood, and samples were collected for the period from the 1st of October;2020 to The first of February;2021 AD, where the study included measuring levels of interleukin-6;Adiponectin,glucose and bilirubin in the blood, comparison study between the study variables with the child's weight (greater than 3 kg),(less or equal 3 kg),the mother's age (greater than 25 years, less or equal to 25 years),the sex of the child (male, female).The results of our study showed that there were no significant differences between the variables of the current study between the two sex
... Show MoreAdministrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has bee
Tremendous efforts have been exerted to understand first language acquisition to facilitate second language learning. The problem lies in the difficulty of mastering English language and adapting a theory that helps in overcoming the difficulties facing students. This study aims to apply Thomasello's theory of language mastery through usage. It assumes that adults can learn faster than children and can learn the language separately, and far from academic education. Tomasello (2003) studied the stages of language acquisition for children, and developed his theory accordingly. Some studies, such as: (Ghalebi and Sadighi, 2015, Arvidsson, 2019; Munoz, 2019; Verspoor and Hong, 2013) used this theory when examining language acquisition. Thus,
... Show MoreThe poor hole cleaning efficiency could causes many problems such as high torque, drag, poor hydraulics and pipe stuck. These inherent problems result in an avoidable high operation cost which this study tried to address. In this study, the effect of cutting density on hole cleaning efficiency in deviated and horizontal wells was investigated. Experiments were conducted using 40 feet (12 m) long of flow loop made from iron and PVC. However, the test section was made from PVC with (5.1m) long and (4” ID) for outer pipe and (2” OD) inner pipe. The cutting transport ratio (CTR) was determined from weight measurements for each test. Cutting Transport Ratio has been investigated for effects of the following parameters; flow rate, cu
... Show More