Preferred Language
Articles
/
ZhichZgBVTCNdQwCaL7L
A Comparative Study of Unauthorized Drone Detection Techniques
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Dec 22 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Accounting Disclosure for non-current intangible assets according to international accounting standard (IAS16, 36): A Comparative Study of the State Company for Travelers and delegates Transportations
...Show More Authors

The Accounting Disclosure for non-current intangible assets is necessary to rely on accounting information by decision makers in the economic unity, two international accounting standards issued (IAS16,36), which aims to provide the foundations of the recognition, measurement and disclosure of appropriate assets Non-current tangible. (IAS16) allowed to use re-evaluation approach to measure assets entrance due to the inadequacy of the accounting information resulting from the application of the historical cost of the entrance under increasing technical developments and continuing that leave clear their effects on non-current intangible assets, As well as the requirements of what came (IAS36) the importance of accounting for the impairment

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Bio Web Of Conferences
An overview of machine learning classification techniques
...Show More Authors

Machine learning (ML) is a key component within the broader field of artificial intelligence (AI) that employs statistical methods to empower computers with the ability to learn and make decisions autonomously, without the need for explicit programming. It is founded on the concept that computers can acquire knowledge from data, identify patterns, and draw conclusions with minimal human intervention. The main categories of ML include supervised learning, unsupervised learning, semisupervised learning, and reinforcement learning. Supervised learning involves training models using labelled datasets and comprises two primary forms: classification and regression. Regression is used for continuous output, while classification is employed

... Show More
View Publication Preview PDF
Scopus (59)
Crossref (46)
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
A Comparative Study of Topical Azailic Acid Cream 20% and Active Lotion Containing Triethyl Citrate and Ethyl Linoleate in the Treatment of Mild to Moderate Acne Vulgaris
...Show More Authors

HR Al-Hamamy, AA Noaimi, IA Al-Turfy, AI Rajab, Journal of Cosmetics, Dermatological Sciences and Applications, 2015

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Plasma levels and diagnostic utility of MMP-2 and TIMP-2 in the diagnosis of Iraqi women with breast tumor: A comparative study with Ca 15-3
...Show More Authors

Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Plasma levels and diagnostic utility of MMP-2 and TIMP-2 in the diagnosis of Iraqi women with breast tumor: A comparative study with Ca 15-3
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Authority control and its role in uniting old arabic authors entries at the Central Library of the University of Baghdad and the Al-Mustansiriya: A Comparative Study
...Show More Authors

The research aims to identify the positives formulation entrances authors depending on the setting retaining the names of the authors of Arab veterans and cons of setting the entrances to Arab authors ancient depending on the nickname by desktop diligence without reference to a setting retaining the potential to benefit other libraries disciple of retaining existing in sober university libraries. Use the survey method and adopted a questionnaire distributed to the research sample consisting of employees working in the libraries in question and the total number of forms that have been distributed (50) form .tousel search phrase conclusions from them .

1-The lack of authority control depends on it to find a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 21 2007
Journal Name
Journal Of Planner And Development
Determination of levels of interaction between urban land use and the adoption of spatial analysis techniques (study area, Najaf City)
...Show More Authors

the student of the structure of the city and its constituent elements will clearly sense the invisible relationships that underlie the different forms of urban activity, which in turn are defined by the generality of the urban patterns in that city, which will vary clearly according to the location in the city. These relations will be embodied in their true form in the interactions between the different uses of the earth, and the change that will result from their regularity in the form of entities in independent groups, which may share with each other a component of it.
Therefore, the process of controlling the functional interactions between the uses of the urban land and the awareness of t

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Assess the Reality of the Process of Applying the strategic Innovation In Business organizations : A prospective Study of comparative analysis in anumber of business organizations the Iraqi Industrial
...Show More Authors

Abstract :

      The research aims to Estimate the Strength of Strategic Innovation application in terms of application strength , and on the overall level in number of Iraqi Industrial business organizations . After wards determine whether their is differerences among those organizations in application process for the dimensions , and for the overall process .

      The Research revealed number of conclusions including that the process of strategic innovation is applied in a good Level , and demonstrates the desier of the industrial companies Leaders to Launch beyond the familiar products , and to provide new products that

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref