Preferred Language
Articles
/
ijs-3388
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algorithms have been implemented to unfold the structures of communities, the influence of NMI on the Q, and vice versa, between a detected partition and the correct partition in signed and unsigned networks is unclear. For this reason, in this paper, we investigate the correlation between Q and NMI in signed and unsigned networks. The results show that there is no direct relationship between Q and NMI in both types of networks.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Strategic Analysis of the Reasons for the Delay of the Investment Projects of the North Oil Company / Case Study
...Show More Authors

The research aims to find a contemporary model in analyzing the reasons behind the delay of the investment plan projects suffered by the North Oil Company. This model is able to understand the environment surrounding the implementation of projects in the light of the changes facing the company at the present time, which in turn requires the need to identify the most important strengths and weaknesses Internal and external opportunities and threats using the SWOT matrix and identify the appropriate strategic alternative based on clear policy, strategies and programs to address weaknesses and look to the future prospects as the company can be stronger and more flexible environmental changes surrounding the reality of implementation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Fri Aug 30 2019
Journal Name
Journal Of The College Of Education For Women
Men and Women’s Education and Illiteracy in Adrar Speech Community
...Show More Authors

In Algeria, education is compulsory for males and females. This foundational decision was taken right after the independence of the country in 1962. Soon after, in 1963, the central government decided the Arabisation of the whole educational levels starting from primary school till university. At the same period, illiteracy-eradication programmes were launched by the Ministry of Education to get rid of this post-colonial scourge. In the administrative department (or Wilaya) of Adrar, former Tuat, young males and females attend Quranic schools (Zawaya) well before any formal education, that is as early as 4-5 years of age. The adult people who are not enrolled in formal classes could sit for non-formal ones. However, actual measurements a

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the Use of Social Media Networks (SMNs) in Knowledge Sharing, by Using Social Cognitive Theory (SCT) A Study Conducted in Some of Iraqi Universities
...Show More Authors

   SMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Effective Computational Methods for Solving the Jeffery-Hamel Flow Problem
...Show More Authors

In this paper, the effective computational method (ECM) based on the standard monomial polynomial has been implemented to solve the nonlinear Jeffery-Hamel flow problem. Moreover, novel effective computational methods have been developed and suggested in this study by suitable base functions, namely Chebyshev, Bernstein, Legendre, and Hermite polynomials. The utilization of the base functions converts the nonlinear problem to a nonlinear algebraic system of equations, which is then resolved using the Mathematica®12 program. The development of effective computational methods (D-ECM) has been applied to solve the nonlinear Jeffery-Hamel flow problem, then a comparison between the methods has been shown. Furthermore, the maximum

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (59)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Wed Jun 30 2010
Journal Name
Al-kindy College Medical Journal
Comparative study of the renoprotective effects of captopril and aminophylline against cainst cisplatin – induced nephrotoxicty in rats
...Show More Authors

Background: Cisplatin is one of the most
commonly used anti-cancer drugs , but its
clinical use was limited by its nephrotoxicity .
Methods: In this study we try to investigate the
renoprotective effect of captopril and
aminophylline against cisplatin induced
nephrotoxicity .For this purpose a 36 Sprague
Dawley rats was divided randomly to 6 groups ,
each group consist of 6 rats. The first group
given normal saline and act as control group,
while the other 5 groups given cisplatin ( 7.5
mg/kg ) , captopril ( 60 mg/kg ) , aminophylline
( 24 mg/kg ) , captopril with cisplatin and
aminophylline with cisplatin respectively. All
drugs are given as single dose through
intraperitonial route. After 6

... Show More
View Publication Preview PDF