Preferred Language
Articles
/
7hYg5IsBVTCNdQwCH-Mp
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the improved algorithm can detect this type of anomaly. Thus, our approach is effective in finding abnormalities.

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
International Journal Of Computing
Twitter Location-Based Data: Evaluating the Methods of Data Collection Provided by Twitter Api
...Show More Authors

Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
Technical methods in foreign language teaching as a new method in foreign language learning
...Show More Authors

Unter dem Titel " Technische Methoden im Fremdsprachunterricht als eine neueste Methode im Fremdsprachlernen, die Spiele als Muster"

versteht man, dass die Forschung  sich mit einer neuen Methoden im Fremdsprachunterricht beschäftigt. Von den neuen Methoden im Unterricht sind die Spiele. So man sieht  in den letzten Jahren viele Artikel zum Thema Spiele im Fremdsprschunterricht. Davon gehen wir aus, dass die Spiele im Unterricht eine groβe Rolle spielt, denn diese Methode macht Lust, Spaβ im Lernenprozeβ. Die Spiele im Unterricht bezeichnen als ein Mittel, um Unterricht etwas Schönes , Nützliches und Lebendigs zu sein. Die Spiele sind vielfälltig und unterscheidet sich nach den Themen und Materialien. In dieser F

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 14 2025
Journal Name
Adab Al Rafidayn
Measuring the quality of office services using (LibQUAL + ®): the central library of the University of Baghdad as a model
...Show More Authors

Libraries, information centers, and everything related to organizing and preparing information need to be periodically re-evaluated in order to stand on the level of quality, which means improving the general reality of these institutions to ensure sufficient satisfaction from beneficiaries of the services provided. This is what was worked on in this research, as one of the most important quality standards in libraries and information centers, LibQUAL+®, was applied in one of the most important and oldest central university libraries, namely the Central Library of the University of Baghdad at its two locations, Al-Jadriya and Al-Waziriya. The sample of beneficiaries to whom the questionnaire was distributed reached 75 beneficiaries distrib

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Case Studies In Chemical And Environmental Engineering
Removal of copper from a simulated wastewater by electromembrane extraction technique using a novel electrolytic cell provided with a flat polypropylene membrane infused with 1-octanol and DEHP as a carrier
...Show More Authors

View Publication
Scopus (7)
Crossref (7)
Scopus Crossref
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Textual jurisprudence and jurisprudence of the science of the text: Linguistic study
...Show More Authors

The modern textual study researched the textuality of the texts and specified for that seven well-known standards, relying in all of that on the main elements of the text (the speaker, the text, and the recipient). This study was to investigate the textuality of philology, and the jurisprudence of the science of the text.

 

View Publication Preview PDF
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Student Conference On Research And Development
Feature extraction for co-occurrence-based cosine similarity score of text documents
...Show More Authors

View Publication
Scopus (10)
Crossref (10)
Scopus Crossref
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Information And Optimization Sciences
Hybrid deep learning model for Arabic text classification based on mutual information
...Show More Authors

View Publication
Crossref (5)
Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus