Preferred Language
Articles
/
DxenW5IBVTCNdQwC2K3g
Intelligence framework dust forecasting using regression algorithms models
...Show More Authors

<span>Dust is a common cause of health risks and also a cause of climate change, one of the most threatening problems to humans. In the recent decade, climate change in Iraq, typified by increased droughts and deserts, has generated numerous environmental issues. This study forecasts dust in five central Iraqi districts using machine learning and five regression algorithm supervised learning system framework. It was assessed using an Iraqi meteorological organization and seismology (IMOS) dataset. Simulation results show that the gradient boosting regressor (GBR) has a mean square error of 8.345 and a total accuracy ratio of 91.65%. Moreover, the results show that the decision tree (DT), where the mean square error is 8.965, comes in second place with a gross ratio of 91%. Furthermore, Bayesian ridge (BR), linear regressor (LR), and stochastic gradient descent (SGD), with mean square error and with accuracy ratios of 84.365%, 84.363%, and 79%. As a result, the performance precision of these regression models yields. The interaction framework was designed to be a straightforward tool for working with this paradigm. This model is a valuable tool for establishing strategies to counter the swiftness of climate change in the area under study.</span>

Scopus Crossref
View Publication
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Emotional Intelligence in kindergarten and its relationship with some variables
...Show More Authors

This study aims at finding out the sentimental smartness of the kindergarten children
and its relationship with some variables.
1- The level of the sentimental smartness of the kindergarten children.
2- Investigating the Zero hypothesis in that there are no significant statistical differences in
the sentimental smartness between the kindergarten children according to the sex variables
(males and females).
Some statistical tools have been used in order to arrive at the results that verify the
hypotheses of this study. The researcher uses (1) the distinctive power between two
distinctive groups; (2) the relationship between the item and the total degree (Pearson
correlation factor); and (3) Elfakronbach formula t

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Entrepreneurial performance in accordance with the competitive intelligence and strategic
...Show More Authors

 The research aims to study the entrepreneurial performance of the banks, according to the intelligence of competitive and strategic as the entrepreneurial performance is the one who does not stand the benefits of excellence in accomplished when just achieving the bank's objectives planned, but exceed it down to creativity in accomplishing these goals in a manner leads to making a entrepreneurial bank in the markets and the focus the eyes of competitors and the banks and other Following his example.

Was chosen the subject of research and strategic intelligence and competitive because of its impact on the strategic success of the banking sector, the fact is the entrepreneurial in the Iraqi banking mar

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Al-academy
The effectiveness of artificial intelligence in contemporary digital graphic design
...Show More Authors

In our world, technological development has become inherent in all walks of life and is characterized by its speed in performance and uses. This development required the emergence of new technologies that represent a future revolution for a fourth industrial revolution in various fields, which contributed to finding many alternatives and innovative technical solutions that shortened time and space in terms of making Machines are smarter, more accurate, and faster in accomplishing the tasks intended for them, and we find the emergence of what is called artificial intelligence (artificial intelligence), which is the technology of the future, which is one of the most important outputs of the fourth industrial revolution, and artificial inte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
The role of kindergarten teachers in developing children's emotional intelligence
...Show More Authors

The study aimed to get acquainted with kindergarten teachers in the development of
emotional intelligence in children, To achieve this a study too, which consisted of 40 items,
within four areas was condncted: (managing emotions, emotional knowledge, empathy, social
networking) The study tool was applied to the sample amounting (200) teachers of the
kindergarten teachers in the province of Jerash and after analyzing the results statistically
using arithmetic averages standard deviations and variance analysis quartet the following
results were reached :
- presence of statistically significant differences at the level of (α =0,05) is attributable to the
impact of the educational level in the areas of empathy and so

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
The Intelligence of the Child in Relation to some Variables
...Show More Authors

The Intelligence of the Child in Relation to some Variables

View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Mathematics And Computer Science
Artificial Intelligence Techniques to Identify Individuals through Palm Image Recognition
...Show More Authors

Artificial intelligence (AI) is entering many fields of life nowadays. One of these fields is biometric authentication. Palm print recognition is considered a fundamental aspect of biometric identification systems due to the inherent stability, reliability, and uniqueness of palm print features, coupled with their non-invasive nature. In this paper, we develop an approach to identify individuals from palm print image recognition using Orange software in which a hybrid of AI methods: Deep Learning (DL) and traditional Machine Learning (ML) methods are used to enhance the overall performance metrics. The system comprises of three stages: pre-processing, feature extraction, and feature classification or matching. The SqueezeNet deep le

... Show More
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Mitigation of collapse characteristics of gypseous soils by activated carbon, sodium metasilicate, and cement dust: An experimental study
...Show More Authors

This study includes adding chemicals to gypseous soil to improve its collapse characteristics. The collapse behavior of gypseous soil brought from the north of Iraq (Salah El-Deen governorate) with a gypsum content of 59% was investigated using five types of additions (cement dust, powder sodium meta-silicate, powder activated carbon, sodium silicate solution, and granular activated carbon). The soil was mixed by weight with cement dust (10, 20, and 30%), powder sodium meta-silicate (6%), powder activated carbon (10%), sodium silicate solution (3, 6, and 9%), and granular activated carbon (5, 10, and 15%). The collapse potential is reduced by 86, 71, 43, 37, and 35% when 30% cement dust, 6% powder sodium meta-silicate, 10% powder activated

... Show More
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
"RUF procedures forgetting the best subset linear regression model"
...Show More Authors

The purpose behind building the linear regression model is to describe the real linear relation between any explanatory variable in the model and the dependent one, on the basis of the fact that the dependent variable is a linear function of the explanatory variables and one can use it for prediction and control. This purpose does not cometrue without getting significant, stable and reasonable estimatros for the parameters of the model, specifically regression-coefficients. The researcher found that "RUF" the criterian that he had suggested accurate and sufficient to accomplish that purpose when multicollinearity exists provided that the adequate model that satisfies the standard assumpitions of the error-term can be assigned. It

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 21 2022
Journal Name
Iraqi Journal For Computer Science And Mathematics
Fuzzy C means Based Evaluation Algorithms For Cancer Gene Expression Data Clustering
...Show More Authors

The influx of data in bioinformatics is primarily in the form of DNA, RNA, and protein sequences. This condition places a significant burden on scientists and computers. Some genomics studies depend on clustering techniques to group similarly expressed genes into one cluster. Clustering is a type of unsupervised learning that can be used to divide unknown cluster data into clusters. The k-means and fuzzy c-means (FCM) algorithms are examples of algorithms that can be used for clustering. Consequently, clustering is a common approach that divides an input space into several homogeneous zones; it can be achieved using a variety of algorithms. This study used three models to cluster a brain tumor dataset. The first model uses FCM, whic

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Security In Wireless Sensor Networks Based On Lightweight Algorithms : An Effective Survey
...Show More Authors

At the level of both individuals and companies, Wireless Sensor Networks (WSNs) get a wide range of applications and uses. Sensors are used in a wide range of industries, including agriculture, transportation, health, and many more. Many technologies, such as wireless communication protocols, the Internet of Things, cloud computing, mobile computing, and other emerging technologies, are connected to the usage of sensors. In many circumstances, this contact necessitates the transmission of crucial data, necessitating the need to protect that data from potential threats. However, as the WSN components often have constrained computation and power capabilities, protecting the communication in WSNs comes at a significant performance pena

... Show More
View Publication
Crossref