Preferred Language
Articles
/
jeasiq-1381
أسلوب بيز في تحليل البيانات غير التامة
...Show More Authors

In this paper we will explain ,how use Bayesian procedure in analysis multiple linear regression model with missing data in variables X's  as the new method suggest , and explain some of missing  Patterns under missing mechanism , missing complete at random MCAR and compare Bayesian estimator with complete case estimator by use  simulation procedure .           

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Oct 25 2023
Journal Name
College Of Islamic Sciences
Provisions for a Muslim to be naturalized with the citizenship of non-Muslim countries
...Show More Authors

Praise to Allah, Lord of the Worlds. Thank you very much. Blessed. As his face should be majestic and great. His authority, and may peace and blessings be upon our master Muhammad, a perpetual blessing until the Day of Judgment

And upon the God of purity, His righteous companions, and those who follow them in righteousness until the Day of Judgment. But after:-

Anyone who looks into the history of nations, peoples, and the conditions of human beings will see that naturalization as a person’s affiliation to a particular state is something that happened only in recent centuries. In ancient times, a person’s loyalty was to the tribe to which the person belonged, and he was integrated into it and attributed to it, and in

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
بناء نظام اداري لتسعير الفعاليات في العقود الانشائية باعتماد هيكلية تجزئة العمل في قطاع المباني في العراق
...Show More Authors

تعتمد فرضية البحث على وجود ظاهرة عامة في إعمال المقاولات لدى المقاولين وهي
تجاوز الكلف الحقيقية المصروفة خلال مرحلة التنفيذ عن الكلف التخمينية للمقاولات الإنشائية
في مرحلة تقديم العطاء مما يسبب العجز المالي والمشاكل الاقتصادية للمقاولين.تبنى البحث
دورة حياة بناء النظام التي تمر بمراحل مختلفة هي تحديد المشكلة وتحليلها وتصميم النظام
الإداري المقترح.ولانجاز ذلك تم دراسة النظم العالمية والمحلية المع

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 03 2010
Journal Name
Journal Of Educational And Psychological Researches
The non right behavior appearance for the kindergarten children and its relation with the kindergarten teaching style
...Show More Authors

The kindergarten teacher play a role in fixing the children behavior so she must plant the value and the habits that make a positive behavior and accepted by the society so the teacher must know all the right educational psychological styles to fix the children behavior and make them accepted psychologically and socially so the problem of the research start from knowing the relation between the methods of dealing with the kindergarten’s teachers and the non right behavior appearance for the kindergarten children. The current research aims to measure the negative behavior appearance of the children of kindergarten and distinguish it according to (sex and levels) and to distinguish the most using styles by the teachers of kinderg

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Estimating the Parameters of Exponential-Rayleigh Distribution under Type-I Censored Data
...Show More Authors

     This paper discusses estimating the two scale parameters of Exponential-Rayleigh distribution for singly type one censored data which is one of the most important Rights censored data, using the maximum likelihood estimation method (MLEM) which is one of the most popular and widely used classic methods, based on an iterative procedure such as the Newton-Raphson to find estimated values for these two scale parameters by using real data for COVID-19 was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. The duration of the study was in the interval 4/5/2020 until 31/8/2020 equivalent to 120 days, where the number of patients who entered the (study) hospital with sample size is (n=785). The number o

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Mar 31 2018
Journal Name
College Of Islamic Sciences
علةُ اختيارِ اللفظِ في منّةِ المنّانِ في الدفاعِ عن القرآن
...Show More Authors

ملخـــص البحــــث

 

  

    طبيعة البحث تهدف الى بيان دقة اختيار السياق القرآني لألفاظه فكل لفظة لايمكن ان يسد مسدها لفظ آخر وان كان مرادف له في الدلالة الا ان هناك من الفروق الدلالية الدقيقة بين تلك الألفاظ حتمّت على النص اختيار الفاظ  دون سواها وكيف ان للسياق الدور الاكبر في هذا الاختيار

View Publication Preview PDF
Publication Date
Tue Jun 01 2004
Journal Name
Al-academy
معنى وشروط الحركة والاتجاه في تصاميم الاقمشة المطبوعة في العراق
...Show More Authors

معنى وشروط الحركة والاتجاه في تصاميم الاقمشة المطبوعة في العراق

View Publication Preview PDF
Publication Date
Thu Mar 20 1930
Journal Name
College Of Islamic Sciences
جهود العلماء في تحديد معنى الإقرار وحقيقته في الفقه الإسلامي
...Show More Authors

جهود العلماء في تحديد معنى الإقرار

وحقيقته في الفقه الإسلامي

View Publication Preview PDF