Phishing is an internet crime achieved by imitating a legitimate website of a host in order to steal confidential information. Many researchers have developed phishing classification models that are limited in real-time and computational efficiency. This paper presents an ensemble learning model composed of DTree and NBayes, by STACKING method, with DTree as base learner. The aim is to combine the advantages of simplicity and effectiveness of DTree with the lower complexity time of NBayes. The models were integrated and appraised independently for data training and the probabilities of each class were averaged by their accuracy on the trained data through testing process. The present results of the empirical study on phishing website dataset suggest that the ensemble model significantly outperformed the hybrid model in terms of the measures used. Finally, DTree and STACKING methods showed superior performances compared to the other models.
"The aim of the research is to identify the availability of the dimensions of the research variables represented by organizational symmetry and the quality of work-life at the University of Information and Communications Technology, which is one of the formations of the Ministry of Higher Education and Scientific Research in Baghdad, in addition to knowing the relationship and influence between them. The research relied on the descriptive analytical approach based on peer description. The research was analyzed and the research sample consisted of (148) individuals, the sample was chosen using the comprehensive inventory method, data was obtained by relying on the questionnaire which was prepared from ready-made m
... Show MoreThis paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.
Stealth marketing is considered as one of the contemporary issues that researchers have begun to explore as a current understanding. It is the marketing approach used by organizations to promote their products and services to the public in implicit and indirect manner. In this article, the concept of stealth marketing will be discussed throw its advantages and disadvantages. In addition, the different techniques of stealth marketing have been discussed including: viral marketing, celebrity marketing, brand pushers, bait-and-tease marketing, video games marketing, and marketing in music. Furthermore, a new technique of marketing entitled “Marketing through social responsibility” has been added and discussed according to the themes in the
... Show MoreSaudi Arabia’s banking sector plays an important role in the country’s development as it is among the leading sectors in the financial sector. Considering, two main Saudi banks (The National Commercial Bank and Saudi American bank), the present study aims to observe the impact of emotional intelligence on employee performance. The components of emotional intelligence affecting employee performance include self-management, relationship management, self-awareness, and social awareness. A quantitative methodology was applied to analyse the survey results of 300 respondents over the period from 2018 to 2019. The results show that there was a significant positive impact of self-management, self-awareness, and relationship manageme
... Show MoreThis study is dedicated to one of the most difficult topics in Russian - this is the science of idioms. A feature of the Russian speech application in recent decades has been the effective change in the lexical composition of the Russian language. This article illustrates the semantic, grammatical and stylistic structural characteristics of the linguistic units that appeared in Russian at the end of the 20th century - the beginning of the twenty-first century. This work defines these terms : terminology, linguistic unity, and terms that are used as synonyms. In this research , we will adhere to the conciliatory view of the problem and include not only the terminology in the language units, but also the terminological compositions, saying
... Show MoreThe concept of closed quasi principally injective acts over monoids is introduced ,which signifies a generalization for the quasi principally injective as well as for the closed quasi injective acts. Characterization of this concept is intended to show the behavior of a closed quasi principally injective property. At the same time, some properties of closed quasi principally injective acts are examined in terms of their endomorphism monoid. Also, the characterization of a closed self-principally injective monoid is given in terms of its annihilator. The relationship between the following concepts is also studied; closed quasi principally injective acts over monoids, Hopfian, co Hopfian, and directly finite property. Ultimately, based on
... Show MoreBackground: Schneiderian first rank symptoms are
considered highly valuable in the diagnosis of
schneideria.
They are more evident in the acute phase of the
disorder and fading gradually with time. Many studies
have shown that the rate of these symptoms are
variable in different countries and are colored by
cultural beliefs and values.
Objectives: To find out the rate of Schneiderian first
rank symptoms among newly diagnosed schizophrenic
patients, to assess which symptom(s) might
predominate in those patients, and to find out if there
is/are any correlation(s) between the occurrence of
these symptoms and the sex of the patients.
Methods: Out of twenty-four patients with no past
psychiatric hi
This paper consist some new generalizations of some definitions such: j-ω-closure converge to a point, j-ω-closure directed toward a set, almost j-ω-converges to a set, almost j-ω-cluster point, a set j-ω-H-closed relative, j-ω-closure continuous mappings, j-ω-weakly continuous mappings, j-ω-compact mappings, j-ω-rigid a set, almost j-ω-closed mappings and j-ω-perfect mappings. Also, we prove several results concerning it, where j Î{q, δ,a, pre, b, b}.
Translation as a human endeavor has occupied the attention of nations since it bridges the gab between cultures and helps in bringing out national integration. The translation of Kurdish literature started with personal efforts in which newspapers and magazines had played a vital role in supporting translation and paved the way for promoting the publication of Kurdish products.
The bulk of the materials translated from Arabic exceeds that translated from other languages owing to the influence of religious and authoritarian factors.
The survey of the Kurdish journals was limited to the period 1898-1991 since it marked a radical and historic change represented by the birth of Kurdish journalis
... Show MoreSince the property in Islam is based on the principle of succession , "which made you Khalaúv land and raise yourselves above some degree of Iblukm with Atakm The Lord of the fast punishment and it is Forgiving, Merciful " [cattle : 165 ] and human only Mstkhalaf where " God promised you who believe and do good deeds for Istkhalvenhm Normans in the ground as those before them " [Nur : 55 ] , considering that King God alone any talk about having ownership in Islam in the contemporary sense of ownership , containing three rights are:
1- right to dispose of the right of usufruct tenure
2-The concept is ambiguous as long as that man Mstkhalaf does not have the right to dispose
... Show More