Preferred Language
Articles
/
jeasiq-1237
دور تنقيب البيانات Data Mining في زيادة أداء المنظمة (( دراسة تحليلية في المصرف الصناعي ))
...Show More Authors

تمهيد

غالبا ما يكون تعامل المنظمات المالية والمصرفية مع الزبائن بشكل أساسي مما يتطلب منها جمع كميات هائلة من البيانات عن هؤلاء الزبائن هذا بالإضافة الى ما يرد اليها يوميا من بيانات يجعلها أمام أكداس كبيرة من البيانات تحتاج الى جهود جبارة تحسن التعامل معها والاستفادة منها بما يخدم المنظمة.

ان التعامل اليدوي مع مثل هذه البيانات دون استخدام تقنيات حديثة يبعد المنظمة عن التطور والارتقاء الى مستويات اداء افضل. ولا يكفي إدخال الحاسبات الى العمل فقط, بل من الأفضل استخدام تقنيات وبرمجيات تخدم الادارة وتقدم لها ما يمكن ان تستفيد منه دون اضاعة للوقت والجهد.

لذلك فان تنقيب البيانات   Data Mining  يقدم الحل لهكذا مشاكل فهي تكنولوجيا جديدة تهدف الى الحصول على معلومات غير معروفه من قواعد البيانات لغرض استخدامها في عملية اتخاذ القرار . انها تحسن من فهم البيانات المتراكمة واستخلاص ثروة المعلومات الموجودة فيها من اجل استثمارها بالشكل الذي يؤدي الى اتخاذ قرار سليم يجنب المنظمة أي خسائر محتملة ويرفع من مستوى ادائها .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE ROLE OF MARKETING MIX AND INNOVATION ON SERVICE DESIGN EXPLORATORY RESEARCH AT COMPANY KOREK TELECOM.: THE ROLE OF MARKETING MIX AND INNOVATION ON SERVICE DESIGN EXPLORATORY RESEARCH AT COMPANY KOREK TELECOM.
...Show More Authors

The success of the company's strategy depends to a large extent on the success of its functional areas, the marketing Mix makes the company more able to monitor the external environment and the rapid changes related to competitors and customers, as well as the innovation contributes to meet the needs of customers and the requirements of competition and try to find solutions to various problems in Innovation ways, and thus integrated marketing and Innovation efforts in the company towards the design of competitive services to meet the requirements of customers and competition. The research aims to determine how marketing Mix and innovation to design unique and distinct services compared to the competitors, through exporator a sample of en

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Cluster Analysis by Using Nonparametric Cubic B-Spline Modeling for Longitudinal Data
...Show More Authors

Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.

In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.

The longitudinal balanced data profile was compiled into subgroup

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Spatial Statistics
Efficient Bayesian modeling of large lattice data using spectral properties of Laplacian matrix
...Show More Authors

Spatial data observed on a group of areal units is common in scientific applications. The usual hierarchical approach for modeling this kind of dataset is to introduce a spatial random effect with an autoregressive prior. However, the usual Markov chain Monte Carlo scheme for this hierarchical framework requires the spatial effects to be sampled from their full conditional posteriors one-by-one resulting in poor mixing. More importantly, it makes the model computationally inefficient for datasets with large number of units. In this article, we propose a Bayesian approach that uses the spectral structure of the adjacency to construct a low-rank expansion for modeling spatial dependence. We propose a pair of computationally efficient estimati

... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun May 11 2025
Journal Name
Iraqi Statisticians Journal
Estimating General Linear Regression Model of Big Data by Using Multiple Test Technique
...Show More Authors

View Publication
Crossref
Publication Date
Fri Feb 28 2025
Journal Name
The Iraqi Geological Journal
Structural Interpretation of Najaf Basin Using the Magnetic and Gravity Data, Central Iraq
...Show More Authors

Potential data interpretation is significant for subsurface structure characterization. The current study is an attempt to explore the magnetic low lying between Najaf and Diwaniyah Cities, In central Iraq. It aims to understand the subsurface structures that may result from this anomaly and submit a better subsurface structural image of the region. The study area is situated in the transition zone, known as the Abu Jir Fault Zone. This tectonic boundary is an inherited basement weak zone extending towards the NW-SE direction. Gravity and magnetic data processing and enhancement techniques; Total Horizontal Gradient, Tilt Angle, Fast Sigmoid Edge Detection, Improved Logistic, and Theta Map filters highlight source boundaries and the

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Mar 15 2019
Journal Name
Alustath Journal For Human And Social Sciences
A Developmental-Longitudinal Study of Request External Modifiers in Authentic and Elicited Data
...Show More Authors

View Publication
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Proposing Robust LAD-Atan Penalty of Regression Model Estimation for High Dimensional Data
...Show More Authors

         The issue of penalized regression model has received considerable critical attention to variable selection. It plays an essential role in dealing with high dimensional data. Arctangent denoted by the Atan penalty has been used in both estimation and variable selection as an efficient method recently. However, the Atan penalty is very sensitive to outliers in response to variables or heavy-tailed error distribution. While the least absolute deviation is a good method to get robustness in regression estimation. The specific objective of this research is to propose a robust Atan estimator from combining these two ideas at once. Simulation experiments and real data applications show that the proposed LAD-Atan estimator

... Show More
View Publication Preview PDF
Crossref (1)
Crossref