Preferred Language
Articles
/
jeasiq-1381
أسلوب بيز في تحليل البيانات غير التامة
...Show More Authors

In this paper we will explain ,how use Bayesian procedure in analysis multiple linear regression model with missing data in variables X's  as the new method suggest , and explain some of missing  Patterns under missing mechanism , missing complete at random MCAR and compare Bayesian estimator with complete case estimator by use  simulation procedure .           

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
دور الموازنة المرنة على أساس النشاط في الرقابة على التكاليف (دراسة تطبيقية في الشركة العامة للصناعات الجلدية)
...Show More Authors

The research aims to identify the level of increase or decrease the product cost through the activity based flexible budgeting that gives us the chance to follows the cost since the product is planed to be made till it appears in the market and it also helps to fined out any problems that are expected to happen in the future and to put the costs under control, also to know much the surveying affects the perfect use for the complete resources in order to be used in the demanded way, the research is divided in to three sides ,the first is specialized for the theoretical side, the second is for the partical side, while the third side is specialized for the conclusions and recommendations.        &nbsp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
Provisions for a Muslim to be naturalized with the citizenship of non-Muslim countries
...Show More Authors

Praise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment

And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-

Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Mon Sep 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
التغير والاستقرار في سلوك الاسهم العادية خلال الفواصل الزمنية "دراسة تطبيقية لعينة من المصارف في بورصة عمان"
...Show More Authors

Knowing the conduct of the common stocks during the different intervals of time (quarterly and yearly) is an important step in choosing and administrating the portfolio of common stocks which be in accordance with the tendency of the investor toward risk and revenues. This is an attempt to understand the behavior of this common stocks in Amman stock Exchange to discover the extent of change in its behavior for employing them by the managers in identifying the accurate and beneficed investments , which meet the ambitions of Arab investor.    

 

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 30 2015
Journal Name
College Of Islamic Sciences
الأدب العربي في ظل إمارة إلورن الإسلامية في نيجيريا
...Show More Authors

    ملخّص البحث     

          حاول البحث دراسة أحوال الأدب العربى تحت الممالك أو الإمارات الإسلامية فى قارة أفريقيا الخضراء. ولضيق نطاق البحث ركزنا الجهود علي إمارة إلورن فى نيجيريا لتكون مرآة تنعكس فيها آثار هذه الممالك فى الأدب.   ولتحقيق الغرض المنشود من البحث عرضنا نبذة طفيفة عن تاريخ ظهور الممالك الإسلامية  فى قارة أفريقيا وأنواعها و

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 03 2005
Journal Name
Al-academy
الدلالات الجمالية والتعبيرية للون في الخزف المعاصر في العراق
...Show More Authors

الدلالات الجمالية والتعبيرية للون في الخزف المعاصر في العراق

View Publication Preview PDF
Publication Date
Sun Nov 20 2022
Journal Name
Journal Of Education College Wasit University
" مظاهر النهضة الحديثة في العراق في العهد العثماني المتأخر "
...Show More Authors

    دخلت حركة الإصلاحات العثمانية العراق مع تولي مدحت باشا ولاية بغداد (1869 -1872)  وكان لذلك اثر كبير في احداث تغيير جذري للمجتمع العراقي ، بدء من اجراء إصلاحات إدارية عززت من نظام الحكم المركزي وسعت الى التقليل من مظاهر الفوضى داخل المجتمع وصولا الى تكوين الوعي السياسي الجمعي والنخبوي للمجتمع العراقي ، منذ النصف الثاني للقرن التاسع عشر حتى مطلع القرن لعشرين. من هنا جاءت فكرة موضوع البحث للاستفادة التاريخية

... Show More
View Publication
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Al-adab Journal
استخدامات المرأة في العمليات الإرهابية لتنظيم داعش في العراق
...Show More Authors

تعد استخدامات المرأة ومشاركتها في تنفيذ العمليات الإرهابية لتنظيمات داعش من أخطر الظواهر الاجتماعية والسياسية والعسكرية في مجتمعنا الإسلامي والعربي، لما يحكم هذا المجتمع من عادات وتقاليد وأعراف وقيم لا تستطيع المرأة أن تخرج على السيطرة عليها، إذ اعتادت المجتمعات العربية بخاصة والإسلامية بعامة أن ترى المرأة بمكانه صاحبة الإيمان المحبة لأسرتها الحرة الأبية والمربية الفاضلة الرافضة كل القيم السلبية التي ت

... Show More
View Publication