The complexity and variety of language included in policy and academic documents make the automatic classification of research papers based on the United Nations Sustainable Development Goals (SDGs) somewhat difficult. Using both pre-trained and contextual word embeddings to increase semantic understanding, this study presents a complete deep learning pipeline combining Bidirectional Long Short-Term Memory (BiLSTM) and Convolutional Neural Network (CNN) architectures which aims primarily to improve the comprehensibility and accuracy of SDG text classification, thereby enabling more effective policy monitoring and research evaluation. Successful document representation via Global Vector (GloVe), Bidirectional Encoder Representations from Tra
... Show MoreThe aim of this study is to assess nurse's knowledge and role in the management of thalassemic patients in the Sulaimania Thalassemia Centre. Methodology: This study utilized a qualitative approach to explore nurses’ knowledge about thalassemia through semi structured group interviews. Questionnaire was synthesized through a comprehensive review of literature. Results: The results show that nurses in Kurdistan region of Iraq have a limited role in terms of decision making and there is lack of nursing documentation other than that of recording abnormal events, and a lack of knowledge about and engageme
Abstract
The aim of this study was to identify the impact of the Knowledge Management Processes on organizational creativity in the Airlines Companies working in Sudan. The hypotheses formulated as:, there is a positive relationship statistically significant differences between knowledge management processes (diagnosis, the acquisition, storage, distribution and application) and organizational creativity. the measurement of the variables had been adopted from previous studies. The study used a Descriptive approach and and the analytical statistical method to construct the model and SPSS Program for data analysis .Purposive sample procedure had been chosen and structured questionnaire had been developed. Out of 215 q
... Show MoreThe contemporary business environment is witnessing increasing calls for modifications to the traditional cost system, and a trend towards adopting cost management techniques to provide appropriate financial and non-financial information for senior and executive departments, including the Resource Consumption Accounting (RCA) technique in question, which classifies costs into fixed and variable to support the decision-making process. Moreover, (RCA) combines two approaches to cost estimation, the first based on activity-based cost accounting (ABC) and the second on the German cost accounting method (GPK). The research aims to provide a conceptual vision for resource consumption accounting, after Considering it as an accounting te
... Show MorePhase change material (PCM) is considered as one of the most effective thermal energy storage (TES) systems to balance energy supply and demand. A key challenge in designing efficient PCM-based TES systems lies in the enhancement of heat transmission during phase transition. This study numerically examines the privilege of employing twisted-fin arrays inside a shell-and-tube latent heat storage unit to improve the solidification performance. The presence of twisted fins contributes to the dominating role of heat conduction by their curved shapes, which restricts the role of natural convection but largely aids the overall heat-transfer process during solidification. The heat-discharge
The current research aims to identify the multiple intelligences in the fourth students’ acquisition of the literary processes of Arabic grammar and to identify the differences in multiple intelligence according to gender (males - females). The study was determined for students of the fourth literary preparatory Al-Hakim Preparatory (for males) and Rabat Preparatory (for females) of the Second Karkh Education Directorate, topics from the Arabic grammar subject (past tense, present tense, imperative, subject, and object) for the first semester of the academic year 2019-2020. The results showed that there were no statistically significant differences at the significance level (0.05) between the average scores of the students who were tau
... Show MoreThe study aimed to investigate the relationship between the multiple intelligence and the numerical sense. The chosen population of the study was the 4th secondary stage students. The sample consisted of 400 female and male student. The researcher utilized two test; multiple intelligence test which include three categories of intelligence (logical-mathematical, spatial, and linguistics) consisted of (36) item, and the numerical sense test that consisted of (44) item. The two tests were constructed by the researcher himself. The psychometric properties of the test were also verified. The results showed that there was a correlation between the multiple intelligence and the numerical sense as well as the students’ means scores
... Show MoreThe research aims to identify the reality of the management strategy followed in the treatment of solid waste in the city of Baquba, and what strategies are used to treat solid waste, and the extent of the application of these strategies, through personal interviews with leading cadres in the Directorate of Baquba Municipality, their assistants and heads of departments, they numbered (55) Individuals. The descriptive method was adopted through a questionnaire prepared to measure the extent of the implementation of the strategy of solid waste management in the city of Baquba and using statistical tools including (arithmetic mean, standard deviation, relative importance, the gap). The research reac
... Show MoreIntrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope
... Show More