Preferred Language
Articles
/
ijs-4968
A Review of Data Mining and Knowledge Discovery Approaches for Bioinformatics
...Show More Authors

     This review explores the Knowledge Discovery Database (KDD) approach, which supports the bioinformatics domain to progress efficiently, and illustrate their relationship with data mining. Thus, it is important to extract advantages of Data Mining (DM) strategy management such as effectively stressing its role in cost control, which is the principle of competitive intelligence, and the role of it in information management. As well as, its ability to discover hidden knowledge. However, there are many challenges such as inaccurate, hand-written data, and analyzing a large amount of variant information for extracting useful knowledge by using DM strategies. These strategies are successfully applied in several applications as data warehouses, predictive analytics, business intelligence, bioinformatics, and decision support systems. There are many DM techniques that are applied for disease diagnostics and treatment, for example cancer diseases that are investigated using multi-layer perception, Naïve Bayes, Decision Tree, Simple Logistic, K-Nearest Neighbor. As will be explored in this paper. Consequently, for future perspectives there is research in progress for real Iraqi data of Breast Cancer using Data Mining techniques, specifically the Tree decision and K-nearest algorithms.

Scopus Crossref
View Publication
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Strengthen the unified accounting system in rental sales Transactions to increase the protection of the real estate trade in installment Proposed framework
...Show More Authors

Due to the large size of dealing in the transactions installment sales in durable products, especially real estate given the privacy to enjoy their property, among other products because of the large amount and the length of the repayment period leading to a risk of non-payment by the buyer because of the possibility to change the credit level to him, especially that most of this type of transaction customers are from limited income owners,  So it has been proposed the use of other transactions in handling real estate instead of installment sales transactions, a rental sale transactions because of the protection provided by this transaction for a vendor that will be mentioned later.

So proposes to st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact of the Lean Thinking on the Rationalization Costs & Achieving Customer Satisfaction: An applied Research at Ur State company Electrical Cables industries
...Show More Authors

The research explored the impact of applying lean thinking With all that carries this term of goals, trends, principles, foundations and concepts, The possibility of applying it in institutions, including Ur public company, an industrial company, And the only one in Iraq specialized in the manufacture of cables, Electrical Wires and the aluminum industry ,Which has been applied to the curriculum of lean thinking , The problem of research is that the institutions, including the company (research sample), adopt and practice traditional administrative, financial and technical methods without relying on modern curricula and ideas, including the subject of our research, In order to achieve the research objectives, the research was divided int

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Stochastic Non-Linear Pseudo-Random Sequence Generator
...Show More Authors

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Technique
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 13 2025
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Techniques
...Show More Authors

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent root-

... Show More
View Publication
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both are independent and bot

... Show More
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Physics: Conference Series
Measurement of uranium concentration in the water samples collected from the areas surrounding in Al-Tuwaitha nuclear site using the CR-39 detector
...Show More Authors

Abstract. In this research, the uranium concentration in (16) water samples collected from some agricultural areas surrounded with AlTuwitha nuclear site in Baghdad-Iraq was measured by using a CR-39 detector. The concentration of uranium in this study was from (0.6 ± 0.33mg/l) to (2.51 ± 0.49 mg/l), and the weighted average for the concentrations (1.262 ± 0.402 mg/l). The results showed it is a concentration of uranium level in water samples studied is higher than the allowed limit recommended by WHO and ICRP.

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Clients' Satisfaction with Nursing Services by Using the Patient Satisfaction with Nursing Care (PSNCS): An Applied Research in some of Baghdad Teaching Hospitals
...Show More Authors

Abstract:

     This study aims to identify the level of patients’ satisfaction among a sample of hospitalized patients in the targeted hospital (Al-Kindy Teaching Hospital, and Al-Yarmook Teaching Hospital). Moreover, this study highlights the reality of services for patients, especially in the targeted governmental teaching hospitals. The Patient Satisfaction with Nursing Care (PSNCS) has been measured in these hospitals through the revised scale by Tang et al, (2013).This scale includes four major domains; Health Information (5 items), Influencing Support (4 items), Decision Control (4 items), Specialized Technical Competence (7 items). The method of surveying patients’ opinions about the degree

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 29 2021
Journal Name
Journal Of The College Of Education For Women
Difficulties of Understanding English Breaking News Headlines by Iraqi EFL Learners at the University Level: عبد القادر طالب نعيم, و جمعة قادر حسين
...Show More Authors

Understanding breaking news necessitates a special attention, since they are written with a special style. The study aims at identifying the difficulties faced by the Iraqi university EFL learners in comprehending English breaking news. The study included 10 fourth year students enrolled at the Department of English, College of Education for Humanities, University of Anbar. Thus, a questionnaire as a research instrument, was sent online to the students. The questionnaire points were related to the identification of difficulties faced by the learners in comprehending English breaking news. The data of the study were (10) headlines selected purposively from Euronews website. The data were qualitatively analyzed based on quantifying the qua

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref