Preferred Language
Articles
/
cRfQNY8BVTCNdQwCtmIm
VSM Based Models and Integration of Exact and Fuzzy Similarity For Improving Detection of External Textual Plagiarism admin June 29, 2019
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The exact location and its relation to cognitive method (risk-caution) of University students
...Show More Authors

The present study aimed to identify the exact location and its relation to cognitive
method (risk_caution) to university students. The sample consisted of (300) students who
were chosen randomly and equally. The study results indicated that students possess an
internal exact location and they also use risk cognitive method. The study also indicated that
there is a prophesies which is an exact location for others to reach to caution cognitive
method. Depending on these results, the study recommended to benefit from the results of the
study variables and from the measurement of the exact location and method of cognitive
(risk_caution) to identify male and female students and especially by consulting units at
college

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Some Properties of the Essential Fuzzy and Closed Fuzzy Submodules
...Show More Authors

In this paper, we introduce and study the essential and closed fuzzy submodules of a fuzzy module X as a generalization of the notions of essential and closed submodules. We prove many basic properties of both concepts.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Integration The Cost Techniques with Balanced Scorecard for The Purposes of Measuring and Evaluating Performance
...Show More Authors

The effective application of the method of measuring and evaluating performance according to the Balanced  Scorecard the need for an information system a comprehensive and integrated for internal and external environment, Which requires the need to develop accounting information system in general and cost management information systems to suit the particular requirements of the environment in terms of the development of modern methods of measurement to include the use of some methods that have proven effective in measuring and evaluating performance.

The research problem in need of management to develop methods of measuring and evaluating performance through the use of both financial measures and non

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Computer And Communications
Parallel Quick Search Algorithm for the Exact String Matching Problem Using OpenMP
...Show More Authors

String matching is seen as one of the essential problems in computer science. A variety of computer applications provide the string matching service for their end users. The remarkable boost in the number of data that is created and kept by modern computational devices influences researchers to obtain even more powerful methods for coping with this problem. In this research, the Quick Search string matching algorithm are adopted to be implemented under the multi-core environment using OpenMP directive which can be employed to reduce the overall execution time of the program. English text, Proteins and DNA data types are utilized to examine the effect of parallelization and implementation of Quick Search string matching algorithm on multi-co

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Banking Entrepreneurial requirements: Models for selected countries: Models for selected countries
...Show More Authors

The research aims to identify the requirements of banking Entrepreneurial in Saudi Arabia and Singapore, where banking Entrepreneurial is an important way to lead employees to acquire the experience and knowledge required by the banking environment, so we note the pursuit of the banking management to acquire new technology proactively and distinctively to compete with others through the introduction of modern technologies that help senior management to develop new banking methods adaptable to the surrounding environmental changes. The problem of research highlights the extent to which the requirements of banking Entrepreneurial are applied in Saudi Arabia and the Republic of Singapore and will be addressed through three investigation

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Semiessential Fuzzy Ideals and Semiuniform Fuzzy Rings
...Show More Authors

        Zadah in [1] introduced the notion of a fuzzy subset A of a nonempty set S as a mapping from S into [0,1], Liu in [2] introduced the concept of a fuzzy ring, Martines [3] introduced the notion of a fuzzy ideal of a fuzzy ring.         A non zero proper ideal I of a ring R is called an essential ideal if I  J  (0), for any non zero ideal J of R, [4].         Inaam in [5] fuzzified this concept to essential fuzzy ideal of fuzzy ring and gave its basic properties.         Nada in [6] introduced and studied notion of semiessential ideal in a ring R, where a non zero i

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Semantic Similarity Assessment of Volunteered Geographic Information
...Show More Authors

The recent development in communication technologies between individuals allows for the establishment of more informal collaborative map data projects which are called volunteered geographic information (VGI). These projects, such as OpenStreetMap (OSM) project, seek to create free alternative maps which let users add or input new materials to the data of others. The information of different VGI data sources is often not compliant to any standard and each organization is producing a dataset at various level of richness. In this research the assessment of semantic data quality provided by web sources, e.g. OSM will depend on a comparison with the information from standard sources. This will include the validity of semanti

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Semantic Similarity Assessment of Volunteered Geographic Information
...Show More Authors

The recent development in communication technologies between individuals allows for the establishment of more informal collaborative map data projects which are called volunteered geographic information (VGI). These projects, such as OpenStreetMap (OSM) project, seek to create free alternative maps which let users add or input new materials to the data of others. The information of different VGI data sources is often not compliant to any standard and each organization is producing a dataset at various level of richness. In this research the assessment of semantic data quality provided by web sources, e.g. OSM will depend on a comparison with the information from standard sources. This will include the validity of semantic accuracy a

... Show More
Crossref