Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective data mining technology. Besides that, this paper implementation of 4 data mining classification techniques was experimented for extracting important insights from the tourism data set. The aims were to find out the best performing algorithm among the compared on the results to improve the business opportunities in the fields related to tourism. The results of the 4 classifiers correctly classifier the attributes were JRIP (84.09%), Random Tree (83.66%), J48 (85.50%), and REP Tree (82.47%). All the results will be analyzed and discussed in this paper.
The aim of this message to monitor this phenomenon throught the Quran , which is the constitution of the Islamic nation and Hariatha as well as to express kasalah integrity , justice honesty , patience , abd pacr .
We feel this vocabulary to hight athical values advocated by the Quran and the need to build commitment to the orthodox society free of corruption that leads ta a disorder of the human society .
The outcome of the study the researcher found that faith to a number of results was most notably the advent of righteusness in the Holy Quran meaning of comprehensive RPR spacious field and breadth Maadenh .
Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreThe aim of this study is to evaluate the implementation of ICT applications in public service organizations, which is responsible for the implementation of public policy. The study examined the success of ICT in achieving its goals by meeting the main needs of the community members which is the first requirement in the success of sustainable development plans before determine the capabilities of ICT. The main pillar of success in the implementation of ICT systems is the key to improving the efficiency of the organization's performance. This is a reflection of the effectiveness and quality of the services provided to its beneficiaries. The study concluded that the current level of capabilities of individuals working in public organizations i
... Show MoreBy using the deacetylation method, chitin is converted into bioproduct chitosan. Deacetylation can be accomplished using chemical or biological mechanisms. Due to its biocompatibility, nontoxicity, biodegradability, natural origin, and resemblance to human macromolecules, it is useful in medicine. Chitosan may have antibacterial and antioxidant properties. Additionally, it could be used in biotechnology, agriculture, gene therapy, food technology, medication delivery, cancer therapy, and other fields. The objective of the current review was to list the most significant applications of Chitosan in the biomedical field.
Many financial institutions invest their surplus funds in stocks, either to obtain dividends or for trading purposes and to obtain profits from the difference between the cost and the selling price, and investment in shares represents an important part of the financial position of financial institutions applying to the common accounting system of banks and insurance companies, in addition to their impact It is clear on the result of the activity of these institutions.The aim of the research is to define what the shares and their types are, and to indicate the accounting treatments needed to move towards the process of adopting the International Financial Reporting Standard No. (9) and its reflection on its financial statements. I
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreSurface modeling utilizing Bezier technique is one of the more important tool in computer aided geometric design (CAD). The aim of this work is to design and implement multi-patches Bezier free-form surface. The technique has an effective contribution in technology domains and in ships, aircrafts, and cars industry, moreover for its wide utilization in making the molds. This work is includes the synthesis of these patches in a method that is allow the participation of these control point for the merge of the patches, and the confluence of patches at similar degree sides due to degree variation per patch. The model has been implemented to represent the surface. The interior data of the desired surfaces designed by M
... Show MoreGlorify and Praise be to God, and prayers and peace be upon the Messenger of God, his family, companions, and those who are loyal to him.
The subject derives its significance from two important sources , the first one lies in the Sunnah of the Prophet, while the other is the family source , which enrich this subject with great importance.
As for the objective of the topic, it shows to the reader the prophetic bases that mitigate and ease the burden of the husband in a way that secures the marital happiness, so that the Muslim woman takes it as a path for her in life and a slogan that illuminates the darkness of the path and makes her to overcom
... Show More