Preferred Language
Articles
/
8hcgPo8BVTCNdQwCpGRl
Validating a Proposed Data Mining Approach (SLDM) for Motion Wearable Sensors to Detect the Early Signs of Lameness in Sheep
...Show More Authors

View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A model of a proposed audit program to audit the strategies of municipal institutions and its impact on achieving sustainable development: An applied research in the municipal institutions of Karbala Governorate
...Show More Authors

Abstract

                  The study aimed to prepare a practical guide for procedures for auditing the strategies of municipal institutions in achieving sustainable development by adopting the idea of ​​the audit matrix through which a classified report is prepared according to the dimensions of sustainable development, by preparing a specialized audit program for the purpose of auditing strategies for achieving sustainable development and emptying the results of the application of each of the paragraphs The program in the audit matrix that was prepared for the purpose of determining the impact of each observation and linkin

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Phenomenology as an approach to seeing the aesthetics of ugliness in contemporary art designs
...Show More Authors

With a descriptive and analytical approach, it discusses the concept of phenomenology as an approach to seeing the aesthetics of ugliness as one of the concepts associated with the aesthetic experience in contemporary art designs, as it is the result of communication between artistic production and the recipient, which leads to creating a state of aesthetic pleasure. A phenomenological method is used to uncover the aesthetics of ugly and to connect ugliness and beauty since ugliness in aesthetics incorporates beauty as a modern aesthetic vision from the phenomenological perspective. The study investigated aesthetics as a phenomenon of perception, sensory knowledge, and the aesthetic response to the production of designs in contemporary a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Malaysian Journal Of Biochemistry And Molecular Biology
Efficiency of primer design tools in evaluation of two molecular methods to detect two single nucleotide polymorphisms related with atherosclerosis
...Show More Authors

Scopus
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The Culture of mother in the selection clothes of children in the Early Childhood
...Show More Authors

Early childhood Is the of the important stages in the life of man and initiated full on others
reliability has been rise in growth toward independence and self-reliance, as is the transition
from the home environment to the kindergarten environment (kindergarten) (4-6) years where
starts in the interaction with the external environment, it is an essential stage in the
construction of sound personal to the child, and choose proper clothes at this age is one of the
important aspects in building the child's personality, as it reflects the clothing behavior and
taste his parents, especially his mother, she is the first responsible for providing clothes for
her children. Children at this stage are dependent the mothers in

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 07 2025
Journal Name
University Of Kirkuk Journal For Administrative And Economic Science
Anova For Fuzzy Data With Practical in The Medical Field
...Show More Authors

This research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.

View Publication Preview PDF
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Fri Mar 10 2023
Journal Name
Mathematics
Hamilton–Jacobi Inequality Adaptive Robust Learning Tracking Controller of Wearable Robotic Knee System
...Show More Authors

A Wearable Robotic Knee (WRK) is a mobile device designed to assist disabled individuals in moving freely in undefined environments without external support. An advanced controller is required to track the output trajectory of a WRK device in order to resolve uncertainties that are caused by modeling errors and external disturbances. During the performance of a task, disturbances are caused by changes in the external load and dynamic work conditions, such as by holding weights while performing the task. The aim of this study is to address these issues and enhance the performance of the output trajectory tracking goal using an adaptive robust controller based on the Radial Basis Function (RBF) Neural Network (NN) system and Hamilton

... Show More
View Publication
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
2014 International Conference On Computer And Information Sciences (iccoins)
Proposed conceptual model for E-service quality in Malaysian universities
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Mining Deviations in Document Writing Style through Vector Dissimilarity
...Show More Authors

     Doubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent.      The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average  weight of their word  are constructed. Second, the degree of cl

... Show More
View Publication
Scopus Crossref