This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obtained rules from positive association rules and negative association rules strengthens to each other with a pretty good confidence score.
The research material was prune plums (
The research material was prune plums (
This work concentrates on the effect of a flex-skin trailing edge flap on the aerodynamic characteristics of SD7037 airfoil at low Reynolds numbers, in the range of 2^10 to 5^10 using computational methods. The study used a range of angle of attack (AOA) associated with the take-off phase and different flap angles. The numerical model was set up in Siemens STAR-CCM+ package using the κ-ω shear stress transport turbulence model and the (γ-Reθ) transition model which ensured the approximate solution of Navier-Stokes equations. The verification of the computational solution was done by the comparison with the available experimental data of the plain flap, and it was discovered that the results matched pretty well at lower AoAs. Results in
... Show MoreDiabetes mellitus caused by insulin resistance is prompted by obesity. Neuropeptide Nesfatin-1 was identified in several organs, including the central nervous system and pancreatic islet cells. Nesfatin-1 peptide appears to be involved in hypothalamic circuits that energy homeostasis and control food intake. Adiponectin is a plasma collagen-like protein produced by adipocytes that have been linked to the development of insulin resistance (IR), diabetes mellitus type 2 (DMT2), and cardiovascular disease (CVD). Resistin was first identified as an adipose tissue–specific hormone that was linked to obesity and diabetes. The aim of this study was to estimate the relationship between human serum nesfatin-1, adiponect
... Show MoreIn digital images, protecting sensitive visual information against unauthorized access is considered a critical issue; robust encryption methods are the best solution to preserve such information. This paper introduces a model designed to enhance the performance of the Tiny Encryption Algorithm (TEA) in encrypting images. Two approaches have been suggested for the image cipher process as a preprocessing step before applying the Tiny Encryption Algorithm (TEA). The step mentioned earlier aims to de-correlate and weaken adjacent pixel values as a preparation process before the encryption process. The first approach suggests an Affine transformation for image encryption at two layers, utilizing two different key sets for each layer. Th
... Show MoreText based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreIn the past two decades, maritime transport traffic has increased, especially in the case of container flow. The BAP (Berth Allocation Problem) (BAP) is a main problem to optimize the port terminals. The current manuscript explains the DBAP problems in a typical arrangement that varies from the conventional separate design station, where each berth can simultaneously accommodate several ships when their entire length is less or equal to length. Be a pier, serve. This problem was then solved by crossing the Red Colobuses Monkey Optimization (RCM) with the Genetic Algorithm (GA). In conclusion, the comparison and the computational experiments are approached to demonstrate the effectiveness of the proposed method contrasted with other
... Show More