Preferred Language
Articles
/
jcofarts-836
النحت العربي في جنوب شبه الجزيرة العربية (اليمن) قبل الاسلام
...Show More Authors

النحت العربي في جنوب شبه الجزيرة العربية (اليمن) قبل الاسلام

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jun 18 2022
Journal Name
Al-academy
التنوع الشكلي والتقني في زخارف صندوق ومشبك الحضرة الكاظمية
...Show More Authors
تعد التنوعات الشكلية والتقنية الزخرفية بأنواعها (هندسية ،نباتية، نصية خطية) مرتكزا أساسيا في تصميم العديد من المنجزات الثابتة والمنقولة فاستخدامها في العتبات المقدسة الإسلامية أظهر قابليتها الإبداعية من خلال تصاميمها لما تتمتع به من تنوعات شكلية ذات سمة تزيينية تم تنظيمها على وفق تصميم يعبر عن العقائد الدينية الإسلامية والتقاليد الفنية الأصيلة الموظفة في صندوق ومشبك الحضرة الكاظمية بما يمثل
... Show More
View Publication Preview PDF
Publication Date
Tue Jun 03 2003
Journal Name
Al-academy
اسباب تفرد استخدام خط النسخ في تصميم الحروف الطباعية
...Show More Authors

اسباب تفرد استخدام خط النسخ في تصميم الحروف الطباعية

View Publication Preview PDF
Publication Date
Tue Jun 03 2003
Journal Name
Al-academy
دور المعالجة الادراكية في اختزال البنية التصميمية للعلامة التجارية
...Show More Authors

دور المعالجة الادراكية في اختزال البنية التصميمية للعلامة التجارية

View Publication Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
التدقيق الداخلي وأثرة في الحد من ظاهرة غسيل الأموال
...Show More Authors

Still Financial institutions, including banks, a key target for money launderers to transfer illicit funds to the legitimate funds and by weaknesses in the internal audit procedures applied in the banks or through a lack of legal structure to combat this phenomenon in addition to the procedures by other regulations                                                                

T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
...Show More Authors

في تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 23 2023
Journal Name
Arab Science Heritage Journal
الترادف في التعليق المغني لشمس الحق محمد العظيم آبادي
...Show More Authors

Praise be to God, Lord of the Worlds, and prayers and peace be upon our master and beloved Muhammad and all his family and companions. As for what follows:

View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of The College Of Languages (jcl)
رواية بوهيميا الخراب دراسة تأويلية في جدلية النص والزمن
...Show More Authors

Bohemia AL-Kharab for Salah Salah Which contain 477Paper deal With History of Nathion This Novel Has a different styl from another IraQis Novels, this Novel has no conversation this is the basic reason Which hav this research .

The novel have 3 versions , the first one deal with explain the text in different ways , the second contains the realation ship between the text and the reader .

Which appear very clear in novel from up to down , whil the third one and the last explaine

The hermonologiq

The time bylose the relation in the novel.

The last thing is the conclusion which has the simple things  conclude by the researcher from several readings  to the novel

 

 <

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة بعض المقدّرات الحصينة في دوال التمييز بأستخدام المحاكاة
...Show More Authors

The development in manufacturing computers from both (Hardware and Software) sides, make complicated robust estimators became computable and gave us new way of dealing with the data, when classical discriminant methods failed in achieving its optimal properties especially when data contains a percentage of outliers. Thus, the inability to have the minimum probability of misclassification. The research aim to compare robust estimators which are resistant to outlier influence like robust H estimator, robust S estimator and robust MCD estimator, also robustify misclassification probability with showing outlier influence on the percentage of misclassification when using classical methods. ,the other

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
دراسة مقارنة بين بعض الطرائق الحصينة في تقدير معلمات انموذج الانحدار الخطي باستخدام اسلوب المحاكاة التجريبي في حالة وجود بيانات تتضمن مشاهدات شاذة
...Show More Authors

In linear regression, an outlier is an observation with large residual.  In other words, it is an observation whose dependent-variable value is unusual given its values on the predictor variables. An outlier observation may indicate a data entry error or other problem.

An observation with an extreme value on a predictor variable is a point with high leverage. Leverage is a measure of how far an independent variable deviates from its mean. These leverage points can have an effect on the estimate of regression coefficients.

Robust estimation for regression parameters deals with cases that have very high leverage, and cases that are outliers. Robust estimation is essentially a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref