Preferred Language
Articles
/
jeasiq-491
User (K-Means) for clustering in Data Mining with application
...Show More Authors

 

 

  The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.

      And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K) and their impact on the process of clustering in the algorithm.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Estimating the reliability function of Kumaraswamy distribution data
...Show More Authors

The aim of this study is to estimate the parameters and reliability function for kumaraswamy distribution of this two positive parameter  (a,b > 0), which is a continuous probability that has many characterstics with the beta distribution with extra advantages.

The shape of the function for this distribution and the most important characterstics are explained and estimated the two parameter (a,b) and the reliability function for this distribution by using the maximum likelihood method (MLE) and Bayes methods. simulation experiments are conducts to explain the behaviour of the estimation methods for different sizes depending on the mean squared error criterion the results show that the Bayes is bet

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
واقع الصومال السیاسي في ظل الحركات الإسلامیة المعاصرة
...Show More Authors

Somal is considered one of the unstable and restless African Arabian country in
comparison with other Arabian. It has been exposed to division and separation by
European colonization process that worked hardly on dividing this country according to
Berlin conference (1884-1885). Even after obtaining its independence during the sixties
and being led by civilian organizations which were unable to solve the problems of
Somalian society after obtaining the independence.
Somal continued its suffering even after the military rule under the leadership of
Mohammed Sayad Beree.
During Beree's rule, Somal suffered from the War with Ethiopia, as well as it
witnessed an economical Crisis. It suffered also from the tribal po

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 02 2005
Journal Name
Political Sciences Journal
واقع ومستقبل الصراعات الدولية والاقليمية في البحر الاحمر
...Show More Authors

واقع ومستقبل الصراعات الدولية والاقليمية في البحر الاحمر

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the tax examiner's procedures in increasing or decreasing tax revenue : Applied research in the General Authority for Taxes
...Show More Authors

Abstract:

               The tax is one of the elements of the general revenues of the state and contributes to covering its expenses. Taxes are imposed in most countries of the world. The tax proceeds depend on a set of factors that contribute either positively or negatively to the tax share by increasing or decreasing it. Therefore, the research aims to demonstrate the role of the tax examiner's procedures in achieving the validity of the taxable base and its reflection on the tax proceeds, as well as reviewing the tax examiner's procedures related to the tax return process. Examination and tax audit of the financial statements, as well as presenting the financial statements to an independent and i

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
The International Journal Of Nonlinear Analysis And Applications
Developing Bulk Arrival Queuing Models with Constant Batch Policy Under Uncertainty Data Using (0-1) Variables
...Show More Authors

This paper delves into some significant performance measures (PMs) of a bulk arrival queueing system with constant batch size b, according to arrival rates and service rates being fuzzy parameters. The bulk arrival queuing system deals with observation arrival into the queuing system as a constant group size before allowing individual customers entering to the service. This leads to obtaining a new tool with the aid of generating function methods. The corresponding traditional bulk queueing system model is more convenient under an uncertain environment. The α-cut approach is applied with the conventional Zadeh's extension principle (ZEP) to transform the triangular membership functions (Mem. Fs) fuzzy queues into a family of conventional b

... Show More
Publication Date
Sun May 01 2011
Journal Name
Information Sciences
Design and implementation of a t-way test data generation strategy with automated execution tool support
...Show More Authors

View Publication
Scopus (68)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2010
Journal Name
2010 Ieee Symposium On Industrial Electronics And Applications (isiea)
Distributed t-way test suite data generation using exhaustive search method with map and reduce framework
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 14 2023
Journal Name
Journal Of Big Data
A survey on deep learning tools dealing with data scarcity: definitions, challenges, solutions, tips, and applications
...Show More Authors
Abstract<p>Data scarcity is a major challenge when training deep learning (DL) models. DL demands a large amount of data to achieve exceptional performance. Unfortunately, many applications have small or inadequate data to train DL frameworks. Usually, manual labeling is needed to provide labeled data, which typically involves human annotators with a vast background of knowledge. This annotation process is costly, time-consuming, and error-prone. Usually, every DL framework is fed by a significant amount of labeled data to automatically learn representations. Ultimately, a larger amount of data would generate a better DL model and its performance is also application dependent. This issue is the main barrier for</p> ... Show More
View Publication Preview PDF
Scopus (628)
Crossref (628)
Scopus Clarivate Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The design of a proposed model for the application of the insurance policy for medical errors
...Show More Authors

The aim of this study is to design a proposed model for a document to insure the mistakes of the medical profession in estimating the compensation for medical errors. The medical profession is an honest profession aimed primarily at serving human and human beings. In this case, the doctor may be subject to error and error , And the research has adopted the descriptive approach and the research reached several conclusions, the most prominent of which is no one to bear the responsibility of medical error, although the responsibility shared and the doctor contributes to them, doctors do not deal with patients according to their educational level and cultural and there are some doctors do not inform patients The absence of a document to insu

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 02 2025
Journal Name
مجلة كلية القانون للعلوم القانونية والسياسية
Employment of Chinese Cyber Power in Regional Conflict Management Strategies The Case of Conflict with Japan After 2014
...Show More Authors

Abstract:- Cyberspace is a new arena for conflict between international powers, especially since the cost of cyber-conflict is less than its traditional warfare counterparts regardless of the nature of the weapons used, whether traditional or non-traditional. Cyber conflict is necessarily based on strategies to deter, attack, and defend. The aim of the cybercrime conflict is to ensure the defensive sufficiency of the state, ensuring its national security and safeguarding its supreme interests. Despite Japan-China relations characterized by convergence and cooperation in post-Cold War economic spheres, Japan continues to retain the growing Chinese influence in East Asia. These variables prompted Japan to announce a hedging strategy due to un

... Show More
View Publication