Preferred Language
Articles
/
8hcgPo8BVTCNdQwCpGRl
Validating a Proposed Data Mining Approach (SLDM) for Motion Wearable Sensors to Detect the Early Signs of Lameness in Sheep
...Show More Authors

View Publication
Publication Date
Tue Mar 21 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
Study the Effect of Using Google Classroom on the Academic Performance Under the Covid19 Pandemic Using Data Mining Technique
...Show More Authors

— In light of the pandemic that has swept the world, the use of e-learning in educational institutions has become an urgent necessity for continued knowledge communication with students. Educational institutions can benefit from the free tools that Google provide and from these applications, Google classroom which is characterized by ease of use, but the efficiency of using Google classroom is affected by several variables not studied in previous studies Clearly, this study aimed to identify the use of Google classroom as a system for managing e-learning and the factors affecting the performance of students and lecturer. The data of this study were collected from 219 members of the faculty and students at the College of Administra

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Using Benford’s Law to detect Financial Fraud
...Show More Authors

Fraud Includes acts involving the exercise of deception by multiple parties inside and outside companies in order to obtain economic benefits against the harm to those companies, as they are to commit fraud upon the availability of three factors which represented by the existence of opportunities, motivation, and rationalization. Fraud detecting require necessity of indications the possibility of its existence. Here, Benford’s law can play an important role in direct the light towards the possibility of the existence of financial fraud in the accounting records of the company, which provides the required effort and time for detect fraud and prevent it.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2016
Journal Name
Swarm And Evolutionary Computation
A new multi-objective evolutionary framework for community mining in dynamic social networks
...Show More Authors

View Publication
Scopus (25)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Proposed Introduction to Activate the Role of Accounting System for Political Parties in Iraq
...Show More Authors

     Purpose - The study aimed at evaluating the accounting system of the Iraqi political parties, which is applied according to legislative texts, and then the ability to provide accounting information to evaluate the strategic performance and control of the party's operational and financial performance.
Findings- The research found that the unified accounting system applied to political parties does not provide relevance informations to judge the performance of the political party, the researcher a proposal for an accounting system that provides the necessary information to measure and monitor the performance of Iraqi political parties can be presented. The

... Show More
View Publication
Crossref
Publication Date
Thu Oct 30 2025
Journal Name
Ieee Access
Optic Flow Estimation for Human Spine Movements Using a Motion Capture System
...Show More Authors

Human interaction technology based on motion capture (MoCap) systems is a vital tool for human kinematics analysis, with applications in clinical settings, animations, and video games. We introduce a new method for analyzing and estimating dorsal spine movement using a MoCap system. The captured data by the MoCap system are processed and analyzed to estimate the motion kinematics of three primary regions; the shoulders, spine, and hips. This work contributes a non-invasive and anatomically guided framework that enables region-specific analysis of spinal motion which could be used as a clinical alternative to invasive measurement techniques. The hierarchy of our model consists of five main levels; motion capture system settings, marker data

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Al–bahith Al–a'alami
A Semiotic Approach to the Analysis of the News Story
...Show More Authors

This study attempts to provide an approach analysis for the news, depending on the bases and principles which conceptuality semiotic researchers of this field first of them «A. J. Gremas» for the theory of «narrative discourse analysis», to more clarify we tried to apply it on a published press- news, to concludes the most important steps and methods that are necessary to follows gain more understanding of the press- news.

View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparative Study for the Early Detection of the most Important Factors Leading to Preeclampsia
...Show More Authors

 

The aim of this research is to determine the most important and main factors that lead to Preeclampsia. It is also about finding suitable solutions to eradicate these factors and avoid them in order to prevent getting Preeclampsia. To achieve this, a case study sample of (40) patients from Medical City - Oncology Teaching Hospital was used to collect data by a questionnaire which contained (17) reasons to be investigated. The statistical package (SPSS) was used to compare the results of the data analysis through two methods (Radial Bases Function Network) and (Factorial Analysis). Important results were obtained, the two methods determined the same factors that could represent the direct reason which causes Preecla

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 18 2022
Journal Name
International Journal Of Early Childhood Special Education
The effectiveness of a proposed teaching strategy according to The Common Knowledge Construction Model in Mathematical Proficiency for middle school student
...Show More Authors

This research aims to know the effectiveness of teaching with a proposed strategy according to the common Knowledge construction modelin mathematical proficiency among students of the second middle class. The researchers adopted the method of the experimental approach, as the experimental design was used for two independent and equal groups with a post-test. The experiment was applied to a sample consisting of (83) students divided into two groups: an experimental comprising (42) students and a control group, the second comprising (41) students., from Badr Shaker Al-Sayyab Intermediate School for Boys, for the first semester of the academic year (2021-2022), the two groups were rewarded in four variables: (chronological age calculated in mo

... Show More
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
دور تنقيب البيانات Data Mining في زيادة أداء المنظمة (( دراسة تحليلية في المصرف الصناعي ))
...Show More Authors

تمهيد

غالبا ما يكون تعامل المنظمات المالية والمصرفية مع الزبائن بشكل أساسي مما يتطلب منها جمع كميات هائلة من البيانات عن هؤلاء الزبائن هذا بالإضافة الى ما يرد اليها يوميا من بيانات يجعلها أمام أكداس كبيرة من البيانات تحتاج الى جهود جبارة تحسن التعامل معها والاستفادة منها بما يخدم المنظمة.

ان التعامل اليدوي مع مثل هذه البيانات دون استخدام تقنيات حديثة يبعد المنظمة عن التط

... Show More
View Publication Preview PDF
Crossref