The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
Abstract
The research aims to demonstrate the commitment of the Federal Financial Supervisory Bureau to meet the requirements of the International Organization of Supreme Audit Institutions (INTOSAI) 3000, the general and private supervision of performance as the highest supervisory authority in Iraq, which is the only authorized to carry out the process of monitoring the performance of government work and activities. To analyze and present the results of the survey questionnaire prepared for the compliance of the Bureau with the requirements of the general and specific criteria related to the performance control process. The researcher reached a number of conclusions, the most important of which is the commitment of the
... Show MoreIn this research was conducted to provide a product to analyze the performance sensor fiber optic used to measure and feel the intensity of the electric field results showed obtained that use sensor long gives reactive high electric field strength and a high value for allergic sensor, but that is at the expense of reducing the intensity of the electric field that is detected
We present the concept of maps Γ- periodi2 on Γ -near-ring S. Our main goal is to research and explore the presence and mapping traits such as h Γ –hom anti-Γ –hom, Γ –α-derivations of Γ -periodi2 on Γ- near-rings.
The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
Abstract
This research aims to define the roles of auditors by clarifying the concept and risks of cyber security in protecting information and financial data in economic units. Najaf, Babylon and Karbala, then the results were analyzed and the results were presented and analyzed to show that adopting cyber security improves the quality of reports Finance through what it achieves in displaying information with credibility and transparency, in a way that suits the needs of users, and cyber security has a role in managing economic resources more effectively to obtain benefits that would have been lost in the event of an
... Show More
This research worked on identifying the effect of increasing the volume of indebtedness by companies listed on the Iraq Stock Exchange on the trading volume of those companies, and this research included some theoretical concepts related to both debt financing and trading volume, and it represents the research community of the joint-stock companies listed in The Iraq Stock Exchange (the banking sector). As for the research sample, it was deliberately chosen represented by companies with continuous trading without stopping, which reached 10 joint-stock companies, and the period of research was extended during the period 2011-2015, and a set of indicators and financial methods were used In measuring research v
... Show MoreAs contemporary security requires the formulation of a comprehensive strategy based on multidimensional sub-strategies (economic, developmental, social, cybersecurity, military,and diplomatic dimensions to achieve so-called sustainable security and address the unconventional challenges that worsened with the turn of the twenty-first century and concerned with violent extremism, often leading to terrorism, Iraq, despite the reversal of the terrorist group ISIS in 2017, seems urgently needed to formulate effective strategies to counter violent extremism, Violent extremism has multiple internal and external reasons. These causes have increased due to local, regional, and international causes. Violent extremist factors began with the outbreak o
... Show MoreThe aim of the study is to investigate the extent to which the teachers of Islamic education and their teachers taught the technological innovations in the universities and to test the significance of the differences between the averages of the degree of practice according to the variables: gender, experience, scientific qualification, and educational stage. To achieve these objectives, a questionnaire consisting of (20) (20) teacher and school, teachers of Islamic education in Iraqi universities.
The results indicated that the degree of the practice of Islamic education teachers and their teachers of technological innovations was moderate, and there were statistically significant differences in the variable of
... Show MoreBackground: Personality could be defined broadly as those characteristics of individuals that describe the pattern of feeling, cognition and behaving. Personality types can be measured by using one of personality type’s measures. Personality has been proposed to influence the oral health. The purpose of the present study was to assess the influence of Personality Types on caries experience in relation to salivary testosterone hormone among teachers in Baghdad city. Materials and Methods: Female teachers (n=534) of randomly selected schools were subjected to personality questionnaire using The Riso-Hudson Enneagram Type Indicator. Teachers were examined to estimate the caries experience according to the decayed-missing and filled i
... Show More