The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
The tetradentate N2O2 Schiff base ligand, which is produced via the condensation reaction of 2-hydroxynaphthaldehyde with phthalohydrazide, is prepared in this work with a fair yield. The prepared ligand was characterized using a microanalysis technique (C.H.N), UV-vis, FTIR, 1H-,13C-NMR, mass spectrometry, and thermal gravimetric analysis (TGA). New complexes were synthesized by a reaction between ligand (N'1E,N'2Z)-N'1,N'2-bis((1-hydroxynaphthalen-2yl)methylene)phthalohydrazide and metal chloride of Co+2, Ni+2, and Zn+2 ions in absolute ethanol. The present complexes are also characterized by techniques such as C.H.N, UV-vis, FTIR, TGA, molar conductivity, atomic absorption, and magnetic moment measurements. The in vitro antimicro
... Show MoreIn recent years, the performance of Spatial Data Infrastructures for governments and companies is a task that has gained ample attention. Different categories of geospatial data such as digital maps, coordinates, web maps, aerial and satellite images, etc., are required to realize the geospatial data components of Spatial Data Infrastructures. In general, there are two distinct types of geospatial data sources exist over the Internet: formal and informal data sources. Despite the growth of informal geospatial data sources, the integration between different free sources is not being achieved effectively. The adoption of this task can be considered the main advantage of this research. This article addresses the research question of ho
... Show MoreAccurate predictive tools for VLE calculation are always needed. A new method is introduced for VLE calculation which is very simple to apply with very good results compared with previously used methods. It does not need any physical property except each binary system need tow constants only. Also, this method can be applied to calculate VLE data for any binary system at any polarity or from any group family. But the system binary should not confirm an azeotrope. This new method is expanding in application to cover a range of temperature. This expansion does not need anything except the application of the new proposed form with the system of two constants. This method with its development is applied to 56 binary mixtures with 1120 equili
... Show MoreIn Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i
... Show MoreAbstract:
This study seeks to shed light on the important processes are linked to the impact of accounting information on the behavior of producer and user of information and are urging informational and informational use. That accounting as a system of accounting information and functions of the delivery of information to decision makers Under behavioral entrance to the formulation of accounting theory should be taken into account Othertlk accounting information in the behavior of the decision maker which requires an explanation of human behavior and predictable.
On the other hand that the accounting information that should be delivered to the decision maker will affect your beha
... Show MoreThe goal of this experimental study is to determine the effects of different parameters (Flow rate, cuttings density, cuttings size, and hole inclination degree) on hole cleaning efficiency. Freshwater was used as a drilling fluid in this experiment. The experiments were conducted by using flow loop consist of approximately 14 m (46 ft) long with transparent glass test section of 3m (9.84 ft.) long with 4 inches (101.6 mm) ID, the inner metal drill pipe with 2 inches (50.8 mm) OD settled with eccentric position positive 0.5. The results obtained from this study show that the hole cleanings efficiency become better with high flow rate (21 m3/hr) and it increase as the hole inclination angles increased from 60 to 90 degree due to dominated
... Show MoreThis research deals with an important grammatical section of the Qur'anic grammar, which is the working names the work of acts in the Quranic grammar in the studies of Iraqi researchers from 1968 to 200 AD.
The study of working names working verb in the Koran of the important studies, especially among Iraqi researchers, the Iraqi researcher has presented detailed studies related to working names particles action verb in the Koran, and my research is studying this important grammatical section of the Koranic grammar, which is the working names working verb in The Holy Quran in the books of Iraqi researchers and their theses from 1968-2000. I studied in the preface working names of the act, and what the Iraqi res
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s
... Show MoreThe work in this research presents an experimental and a theoretical study to obtain the effect of using a low permeability geosynthetic material on the longitudinal and lateral coefficients of dispersion. This would have its effect on the contaminants migration through an isotropic, homogenous and saturated soil. The first stage of this research involves the study of the geosynthetic material and in calculating the longitudinal and lateral coefficients of dispersion for an Iraqi sandy soil by using an experimental set-up to simulate the processes. To investigate the effect of using a geosynethtic material on the dispersion coefficients, the test was conducted for each velocity that was used in the experimental work and as follows: with
... Show MoreThis paper presents an experimental and numerical study which was carried out to examine the influence of the size and the layout of the web openings on the load carrying capacity and the serviceability of reinforced concrete deep beams. Five full-scale simply supported reinforced concrete deep beams with two large web openings created in shear regions were tested up to failure. The shear span to overall depth ratio was (1.1). Square openings were located symmetrically relative to the midspan section either at the midpoint or at the interior boundaries of the shear span. Two different side dimensions for the square openings were considered, mainly, (200) mm and (230) mm. The strength results proved that the shear capacity of the dee
... Show More