Administrative procedures in various organizations produce numerous crucial records and data. These
records and data are also used in other processes like customer relationship management and accounting
operations.It is incredibly challenging to use and extract valuable and meaningful information from these data
and records because they are frequently enormous and continuously growing in size and complexity.Data
mining is the act of sorting through large data sets to find patterns and relationships that might aid in the data
analysis process of resolving business issues. Using data mining techniques, enterprises can forecast future
trends and make better business decisions.The Apriori algorithm has been introduced to calculate the
association rules between objects; the primary goal of this algorithm is to establish an association rule between
various things. The association rule describes how two or more objects are related.We have employed the
Apriori property and Apriori Mlxtend algorithms in this study and we applied them on the hospital database;
and, by using python coding, the results showed that the performance of Apriori Mlxtend was faster, and it
was 0.38622, and the Apriori property algorithm was 0.090909. That means the Apriori Mlxtend was better
than the Apriori property algorithm.
|
The research aims to reveal the relationship between the use of social networking sites and the image that females make about their physical formation, the nature of the effects, their value judgments about the image of their bodies, their attitudes toward plastic surgery, the most important types of these processes for them, their motivations to conduct them, and the cultural pressures they are exposed to. The study, moreover, investigates in the effects of those plastic surgery on their behavior as active and interacting users with what is published on social media, according to the theory of social comparison. This paper is an attempt to understand the pattern of social networking |
This is a contextual study in face and isotope science, and I have made it in one of the terms faces and isotopes, which is the word (bad). Quranic also, and that is at every aspect they mentioned.
The nature of the research required that it be divided into three sections:
The first topic: I singled it out to show the types of contextual connotations.
- The second topic: I singled it out to define the word bad and its meaning.
- The third topic: I devoted it to the study of the word bad and explaining the significance of the Quranic context on the additional meaning and the original meaning.
Conclusion: It mentioned the most important results, which are:
1- The significance of the Quranic context is one of the most impo
Rheological instrument is one of the basic analytical measurements for diagnosing the properties of polymers fluids to be used in any industry. In this research polycarbonate was chosen because of its importance in many areas and possesses several distinct properties.
Two kinds of rheometers devices were used at different range of temperatures from 220 ˚C-300 ˚C to characterize the rheological technique of melted polycarbonate (Makrolon 2805) by a combination of different investigating techniques. We compared the results of the linear (oscillatory) method with the non-linear (steady-state) method; the former method provided the storage and the loss modulus of melted polycarbonate, and presented the Cox-Merz model as well. One of the
The present study discusses the problem based learning in Iraqi classroom. This method aims to involve all learners in collaborative activities and it is learner-centered method. To fulfill the aims and verify the hypothesis which reads as follow” It is hypothesized that there is no statistically significant differences between the achievements of Experimental group and control group”. Thirty learners are selected to be the sample of present study.Mann-Whitney Test for two independent samples is used to analysis the results. The analysis shows that experimental group’s members who are taught according to problem based learning gets higher scores than the control group’s members who are taught according to traditional method. This
... Show MoreThe Internet makes the world like a small village. It has the ability to make groups of the same ideas, thoughts, and identity close to each other by gathering them in one place. It is a way to communicate and share information and opinion; shaping and sharing of comprising individuals with common interests and the participation of individuals in a fruitful dialogue results in achieving a set of goals promote ideas and mobilizing people about issues and events of common interests.
To address the relationship of the internet via interactive communication and its ability to achieve social capital and discuss issues and various social events, the study sees that the problem of the study could be formulated as follows:
Consid
... Show MoreNosocomial infections (NIs) are hospital-acquired associated infections, and also contracted due to the infections or toxins that exist in some location, like hospital. Therefore in our study, 4 Lactic acid bacteria (LAB) isolates were obtained from dairy product (Lactobacillus brevis, L. acidophilus, Lactococcus raffinolactis and Lactococcus lactis) and were tested for Bacteriocin production to select Lactococcus lactis among them. Cell free supernatant (CFS), Lipid and partial purification of protein La. Lactis had high inhibitory effect against test pathogens (E. coli, Bacillus cereus, Staphylococcus aureus and Streptococcus). 30 isolates that diagnosed by Vitec, were isol
... Show MoreThe current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s
... Show More