Preferred Language
Articles
/
jeasiq-933
Robust Estimations of Cluster Analysis: Practical Application in Administrative and Financial Corruption
...Show More Authors

Cluster analysis (clustering) is mainly concerned with dividing a number of data elements into clusters. The paper applies this method to create a gathering of symmetrical government agencies with the aim to classify them and understand how far they are close to each other in terms of administrative and financial corruption by means of five variables representing the prevalent administrative and financial corruption in the state institutions. Cluster analysis has been applied to each of these variables to understand the extent to which these agencies are close to other in each of the cases related to the administrative and financial corruption.           

Outliers and infected data of the well-thought phenomenon have led to inaccurate results that were highlighted by the cluster analysis process made on the infected data. This gave rise to adopt efficient estimation methods known as the Robust Methods, which are used when the deliberate phenomenon-related data is infected due to certain outliers. Thus, this paper is purposed to obtain robust estimations that are functional in determining the robust distances for elimination of outlier and data cleansing by means of certain robust methods the stahel-donoho estimator.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Measurement and Analysis of Oil Price Fluctuations and Trends of Government Spending on the Security and Health Sectors in Iraq for the Period (2006-2016)
...Show More Authors

The objective of the study: To diagnose the reality of the relationship between the fluctuations in world oil prices and their reflection on the trends of government spending on the various economic sectors.

The research found: that public expenditures contribute to the increase of national consumption through the purchase of consumer goods by the state for the performance of the state's duties or the payment of wages to employees in the public sector and thus have a direct impact on national consumption

The results of the standard tests showed that there is no common integration between the oil price fluctuations and the government expenditure on the security sector through the A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education Online
Quality of Transition to E-Learning under Corona pandemic: An Application Study in College of Administration and Economics, Baghdad University
...Show More Authors

E-learning is a lifeline for the educational process, which contributed to the sustainability of working educational organizations and prevented them from stopping, so the study came to measure the compatibility between E-learning quality dimensions (information technology, educational curricula, teaching methods, and intellectual capital of educational institution) as an independent variable, and educational services quality dimensions represented by (safety, tangibility, reliability and Confidence) as a dependent variable. The sample was 150 teachers was drawn from the College of Administration and Economics community of 293 teachers through the use of several statistical methods to measure the degree of correlation and impact between the

... Show More
Scopus
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
A Pragmatic Analysis of Illocutionary Act in a Selected Presidential Speech on COVID-19
...Show More Authors

     This paper aims at studying the illocutionary speech acts: direct and indirect to show the most dominant ones in a presidential speech delivered by the USA president. The speech is about the most critical health issue in the world, COVID-19 outbreak.  A descriptive qualitative study was conducted by observing the first speech delivered by president Trump concerning coronavirus outbreak and surveying the illocutionary acts: directive, declarative, commissive, expressive, and representative. Searle's (1985) classification of illocutionary speech acts is adopted in the analysis.

     What are the main types of the illocutionary speech acts performed by Trump in his speech?; Why does

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Anti-Money Laundering Protection procedures in Commercial With establishment of a Proposal from work to Audit banks
...Show More Authors

Concurrently with the technological development that the world is witnessing the crime of money laundering to evolve faster and with multiple methods and its economic, political and social impacts raised increasingly. And for phenomenon dangerous the international community in recent years is keen to be considered combating money laundering as a general indication whereby verification of the international response the stats and its banks and financial institutions with international requirements mandated in this aspect, so the increasing interest the governments of countries in the laws and procedures that contribute to the reduction of the phenomenon of money laundering and avoid legislation economy and the banking and financial sectors

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Optimal Prediction Using Artificial Intelligence Application
...Show More Authors

View Publication
Scopus (16)
Crossref (15)
Scopus Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
فاعلية أستراتيجية ثنائية التحليل والتركيب في تحصيل طالبات الصف الرابع العلمي والتفكير عالي الرتبة في مادة علم الأحياء
...Show More Authors

The current research aims to study (the effect of strategy of analysis - synthesis duality in the collection of scientific fourth stage students and high-order thinking in Biology material). For evidence the objective of the research, the researcher formulated the following two null hypotheses: 1. There is no significant difference at the statistical level (0.05) between the average of scores of the experimental group students that will study according to the dualism strategy of analysis and structure and the average of scores of the controlled group students that will study according to the normal way in the collection. 2. There is no significant difference at the statistical level (0.05) between the average of scores of the experimenta

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the effect of local exogenous application of osteopontin on wound healing in rats
...Show More Authors

Background: Wound healing is a complex dynamical interaction between various cell types, the extracellular matrix, cytokines, and growth factors. osteoponetin is a substance that acts as an anti-inflammatory. Aims of study: The study was designed to identify the role of local exogenous applications of osteopontin on wound healing (in cheek skin). Materials and methods: Thirty adult male albino rats weighting an average of (250-300gm) used in this study, incisional wounds were made in the skin of the cheek of rat and they were divided into the following groups: A-Control group: 15 rats treated with 1µ l of normal saline B-Experimental groups: 15 rats treated with topical application of 1µl osteopontin. The scarification of animals we

... Show More
View Publication
Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 04 2012
Journal Name
مجلة العلوم التربوية والنفسية
The effect of a teaching program on oral classroom communication skills in the performance of practical education students at the College of Education, Bin Al-Haytham.
...Show More Authors

Preview PDF