Preferred Language
Articles
/
ijs-3829
Modeling Social Networks using Data Mining Approaches-Review
...Show More Authors

     Getting knowledge from raw data has delivered beneficial information in several domains. The prevalent utilizing of social media produced extraordinary quantities of social information. Simply, social media delivers an available podium for employers for sharing information. Data Mining has ability to present applicable designs that can be useful for employers, commercial, and customers. Data of social media are strident, massive, formless, and dynamic in the natural case, so modern encounters grow. Investigation methods of data mining utilized via social networks is the purpose of the study, accepting investigation plans on the basis of criteria, and by selecting a number of papers to serve as the foundation for this article. Afterward a watchful evaluation of these papers, it has beeniscovered that numerous data extraction approaches were utilized with social media data to report a number of various research goals in several fields of industrial and service. Though, implementations of data mining are still raw and require more work via industry and academic world to prepare the work sufficiently. Bring this analysis to a close. Data mining is the most important rule for uncovering hidden data in large datasets, especially in social network analysis, and it demonstrates the most important social media technology.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
International Journal For Research In Applied Sciences And Biotechnology
bioseparation review published
...Show More Authors

Publication Date
Wed Oct 11 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Cognitive-Behavioral Counseling in Reducing Symptoms of Social Anxiety and Improving Social Skills among Intermediate School Students in Dhi Qar Governorate
...Show More Authors

The study aims to investigate the effectiveness of cognitive-behavioral counseling in reducing symptoms of social anxiety and improving social skills among a sample of intermediate school students in the city of Souq Al-Shuyukh at Dhi Qar Governorate. The sample consisted of (40) female students, their ages ranged (14-15). They were selected based on their high scores on the social anxiety scale. The sample was divided into two groups: an experimental group, and a control group, equal in number (20) students in each group. The researcher used the social anxiety scale and the social skills scale. In addition, he used the cognitive-behavioral counseling program, consisting of (11) counseling sessions, with a rate of (45) minutes per sessio

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 04 2024
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Environmental tax and its role in sustainable social development
...Show More Authors

Abstract:

  The research aims to diagnose the relationship between the environmental tax and the development of the sustainable social dimension, where the environmental tax is considered a tool in promoting sustainable development according to its economic, social and environmental dimensions through the application of legislation and instructions for environmental protection, and that imposing an environmental tax will have a clear impact in achieving the dimensions of sustainable development and compliance With regard to the social dimension, the research relied on the financial data for the years (2019-2022) in obtaining information. The research reached a set of results, the most prominent of which was

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering
Roller compacted concrete: Literature review
...Show More Authors

Roller compacted concrete (RCC) is a material with no slumps and is made from the same raw materials as conventional concrete. The roller compacted dam method, the high paste technique, the corps of engineers method, and the maximum density method are all ways of designing RCC. The evolution of RCC has resulted in a substantial change in construction projects, most notably in dams, because of the sluggish pace of conventional placement, consolidation, and compacting. The construction process was accelerated by incorporating RCC into dams, resulting in a shorter construction period. Research shows that the dams that used RCC had completed one to two years sooner than the dams that used regular concrete (Bagheri an

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fast Training Algorithms for Feed Forward Neural Networks
...Show More Authors

 The aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN

View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Secure Location Privacy Transmitting Information on Cellular Networks
...Show More Authors

      As smartphones incorporate location data, there is a growing concern about location  privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 01 2012
Journal Name
2012 8th International Conference On Wireless Communications, Networking And Mobile Computing
Performance Evaluation of Location Management in GSM Networks
...Show More Authors

View Publication
Crossref (1)
Scopus Crossref
Publication Date
Mon Sep 01 2014
Journal Name
2014 Ieee 25th Annual International Symposium On Personal, Indoor, And Mobile Radio Communication (pimrc)
Percolation condition for interference-limited cognitive radio networks
...Show More Authors

In this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes

... Show More
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Wireless And Ad Hoc Communication
Energy Aware Scheme for Underwater Wireless Sensor Networks
...Show More Authors

The development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp

... Show More
View Publication
Crossref (1)
Crossref