The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (
... Show MoreIn this study, the concentrations of uranium for four species of plants; Spinacia, Brassica Oleracea, BEASSICA Oleracea Var Capitata and Beta Vulgaris were measured in addition to the measurement of uranium concentrations in the selected soil by calculating the number of significant traces of alpha in CR-39. The 2.455 Bq/kg in Spinacia plant were the highest concentration while the lowest concentration of uranium were 1.91 Bq/kg in BEASSICA Oleracea Var Capitata plant. As for the transfer factor, the highest value 0.416 were found in Spinacia plant and the lowest value 0.323 were found in BEASSICA Oleracea Var Capitata plant. The uranium in the models studied in it did not exceed the international limit, according to the International Atomi
... Show MoreThe research aimed at measuring the compatibility of Big date with the organizational Ambidexterity dimensions of the Asia cell Mobile telecommunications company in Iraq in order to determine the possibility of adoption of Big data Triple as a approach to achieve organizational Ambidexterity.
The study adopted the descriptive analytical approach to collect and analyze the data collected by the questionnaire tool developed on the Likert scale After a comprehensive review of the literature related to the two basic study dimensions, the data has been subjected to many statistical treatments in accordance with res
... Show MoreResearch on the automated extraction of essential data from an electrocardiography (ECG) recording has been a significant topic for a long time. The main focus of digital processing processes is to measure fiducial points that determine the beginning and end of the P, QRS, and T waves based on their waveform properties. The presence of unavoidable noise during ECG data collection and inherent physiological differences among individuals make it challenging to accurately identify these reference points, resulting in suboptimal performance. This is done through several primary stages that rely on the idea of preliminary processing of the ECG electrical signal through a set of steps (preparing raw data and converting them into files tha
... Show MoreThis study examined the adsorption behavior of anionic dye (orange G) from aqueous solution onto the raw and activated a mixture of illite, kaolinite and chlorite clays from area of Zorbatiya (east of Iraq).The chemical treatment involved alkali and acid activation. The alkali activation obtained by treated the raw clay (RC) with 5M NaOH (ACSO) and the acid activation founded by treated it with 0.25M HCl (ACH) and 0.25M (ACS). The thermal treatment carried out by calcination the produce activated clay at 750oC for acid activation and 105oC for alkali activation. Batch
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
يتعرض قانون الموازنة العامة الاتحادية للطعن بعدم الدستورية كغيره من القوانين، بل أن الطعن فيه يكاد يكون سنوياً حال نشره في الجريدة الرسمية ، وتوجه إليه المطاعن بعدم الدستورية إما عن إجراءات تشريعه أو لمضامينه المتعارضة مع الدستور نصاً أو روحاً ، ولكنّه إذا كانت مدة الطعن بعدم دستورية القوانين كافة متاحة دون قيد زمني محدد ولا تتطلب سوى إجراءات إقامة الدعوى العامة وأخصها قيام شرط المصلحة في حالة الدعوى ال
... Show MoreThere is a great operational risk to control the day-to-day management in water treatment plants, so water companies are looking for solutions to predict how the treatment processes may be improved due to the increased pressure to remain competitive. This study focused on the mathematical modeling of water treatment processes with the primary motivation to provide tools that can be used to predict the performance of the treatment to enable better control of uncertainty and risk. This research included choosing the most important variables affecting quality standards using the correlation test. According to this test, it was found that the important parameters of raw water: Total Hardn