Preferred Language
Articles
/
jeasiq-491
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K) and their impact on the process of clustering in the algorithm.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 06 2013
Journal Name
Journal Of Educational And Psychological Researches
The reality of teaching performance materials for teachers of social primary stage
...Show More Authors


    The teacher is the most able to achieve the goals of education in education because he has the ability to affect the behavior of the disciples testified and its actions and appearance and other actions that convey pupils with it sometimes in a manner unconscious or unconscious , and the importance of the role of the teacher in the educational process , it is necessary to compromise the care and attention to the extent that commensurate with the important role that the rise in the preparation of youth and composition , and as a result is needed to continue efforts to improve the quality of teacher preparation so that it can be more effective and positive in the educational process .
First - Research Goals -<

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Integration between hydrochemical and physical data with geographic information systems (GIS) for selecting the best locations groundwater wells in Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Public sector in Iraq Transition and partnership with the private sector
...Show More Authors

  The role of the public sector- Investment customizations-  economic embargo -  The role of the private sector - Coexistence between the public and private sectors -   Ratio of growth

View Publication
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Application of the Elevation and Residual Static Correction methods on a selected Seismic data of West Luhais area in the South of Iraq
...Show More Authors

The present study deals with processing of one seismic line (2WL2) with a length of (37km) for (2D) seismic data of west Luhais area that is located within the administrative borders of the province of Muthanna in south of Iraq. The quality of the recorded data of this line is in general weak due to the effect of noise mainly. The study was made up in oil Exploration Company by utilizing OMEGA software which consists of a great number of the processing programs. The elevation static correction and residual static correction were applied on the studied line and the final section were resulted after completing the treatment processes that proceed followed of the static correction process and the result of elevation static correcting was go

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
Application of the Surface- consistent DE convolution on a seismic data of Al-Najaf and Al-Muthanna Governorates in the south of Iraq
...Show More Authors

This study deals with the application of surface-consistent  deconvolution  to the two-dimensional seismic data applied to the Block 11 area within the administrative boundaries of Najaf and Muthanna Governorates with an area of ​​4822 , the processed seismic data of line (7Gn 21) is 54 km long. The study was conducted within the Processing Department of the Oil Exploration Company. The gap surface- consistent deconvolution was applied using best results of the  parameters  applied  were: The length of the operator 240, the gap operator 24, the white noise 0.01%, the seismic sections of this type showed improvement with the decay of the existing complications and thus give a good continuity of the reflectors

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Application of Source Parameter Imaging (SPI) Technique to Gravity and Magnetic Data to Estimate the Basement Depth in Diyala Area, Eastern Central Iraq
...Show More Authors

The Bouguer gravity and magnetic RTP data were used to detect the depth of basement rocks in middle and south Diyala Province, east Iraq. The depth of the basement rocks was calculated by using the Source Parameter Imaging (SPI) method. New attempt is achieved to applied the SPI technique to the gravity values to estimate the depth of basement rocks. The depths of basement map derived from gravity data range 8-14 km, the depth of basement map derived from magnetic data range 9-13.5 km and the basement depth prepared by C.G.G, 1974 range 9-11 km. The derived maps from SPI method and that prepared by C.G.G, 1974 show good matching in the distribution of the depths of the study area. This study showed that basement’s depth range from

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Comparison between the empirical bayes method with moments method to estimate the affiliation parameter in the clinical trials using simulation
...Show More Authors

In this research the Empirical Bayes method is used to Estimate the affiliation parameter in the clinical trials and then we compare this with the Moment Estimates for this parameter using Monte Carlo stimulation , we assumed that the distribution of the observation is binomial distribution while the distribution with the unknown random parameters is beta distribution ,finally we conclude that the Empirical bayes method for the random affiliation parameter is efficient using Mean Squares Error (MSE) and for different Sample size .

View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Reconstruction of Three-Dimensional Object from Two-Dimensional Images by Utilizing Distance Regularized Level Algorithm and Mesh Object Generation
...Show More Authors

Three-dimensional (3D) reconstruction from images is a most beneficial method of object regeneration by using a photo-realistic way that can be used in many fields. For industrial fields, it can be used to visualize the cracks within alloys or walls. In medical fields, it has been used as 3D scanner to reconstruct some human organs such as internal nose for plastic surgery or to reconstruct ear canal for fabricating a hearing aid device, and others. These applications need high accuracy details and measurement that represent the main issue which should be taken in consideration, also the other issues are cost, movability, and ease of use which should be taken into consideration. This work has presented an approach for design and construc

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF