Preferred Language
Articles
/
jih-3102
Applying Ensemble Classifier, K-Nearest Neighbor and Decision Tree for Predicting Oral Reading Rate Levels
...Show More Authors

For many years, reading rate as word correct per minute (WCPM) has been investigated by many researchers as an indicator of learners’ level of oral reading speed, accuracy, and comprehension. The aim of the study is to predict the levels of WCPM using three machine learning algorithms which are Ensemble Classifier (EC), Decision Tree (DT), and K- Nearest Neighbor (KNN). The data of this study were collected from 100 Kurdish EFL students in the 2nd-year, English language department, at the University of Duhok in 2021. The outcomes showed that the ensemble classifier (EC) obtained the highest accuracy of testing results with a value of 94%. Also, EC recorded the highest precision, recall, and F1 scores with values of 0.92 for the three performance measures. The Receiver Operating Character curve (ROC curve) also got the highest results than other classification algorithms. Accordingly, it can be concluded that the ensemble classifier is the best and most accurate model for predicting reading rate (accuracy) WCPM.    

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Physics: Conference Series
Theory and applications of Marshall Olkin Marshall Olkin Weibull distribution
...Show More Authors
Abstract<p>In probability theory generalizing distribution is an important area. Several distributions are inappropriate for data modeling, either symmetrical, semi-symmetrical, or heavily skewed. In this paper, a new compound distribution with four parameters called Marshall Olkin Marshall Olkin Weibull (MOMOWe) is introduced. Several important statistical properties of new distribution were studied and examined. The estimation of unknown four parameters was carried out according to the maximum likelihood estimation method. The flexibility of MOMOWe distribution is demonstrated by the adoption of two real datasets (semi-symmetric and right-skewed) with different information fitting criteria. Su</p> ... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Tue Aug 07 2018
Journal Name
Asian Journal Of Pharmaceutical And Clinical Research
KNOWLEDGE AND MALPRACTICES IN PEDIATRICS DIARRHEA MANAGEMENT BY IRAQI MOTHERS
...Show More Authors

Objectives: In developing countries like Iraq, diarrhea was responsible for 70% of deaths among pediatrics. This study was designed to determine Iraqi mothers’ knowledge and malpractices associated with diarrhea management in pediatrics.Methods: A cross-sectional pilot study was done on a convenient sample of mothers in Baghdad – Iraq. Data collection was done using a validated questionnaire specifically designed for this study.Result: Most participants preferred to consult physicians or pharmacists about pediatrics diarrhea management. Breastfeeding was stopped by 19% of participants, whereas 35% of mothers who depend on formulated milk discontinued it. Only 30% of participants use oral rehydration solution therapy always as a

... Show More
View Publication
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jul 25 2019
Journal Name
Advances In Intelligent Systems And Computing
Solving Game Theory Problems Using Linear Programming and Genetic Algorithms
...Show More Authors

View Publication
Scopus (18)
Crossref (12)
Scopus Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Causes and Effects of Earnings Management on Stock Prices
...Show More Authors

This study uses the performance of the discretionary estimation models by using a sample of listed companies in the Netherlands and Germany. The actual accounting framework provides a wide opportunity for managers to influence data in financial reporting. The corporate reporting strategy, the way managers use their discretionary accounting, has a significant effect on the company's financial reporting. The authors contribute to the literature through enhancement to these models to accomplish better effects of identifying earnings management as well as to present evidence that is particular to the Dutch and German setting.

For this, we followed the methodology of Dechow, Sloan, and Sweeney (1995) and Chan

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Value added tax and its technical organization Lebanon Case Study
...Show More Authors

Abstract

      Value Added Tax (VAT) is one of the most important types of indirect taxes because of its advantages in achieving financial, economic and financial objectives. The introduction of VAT is part of the reform of the structure of the Lebanese public tax system aimed at reducing the fiscal deficit and resulting inflation, which still lacks a general consumption tax. There is also an urgent need to increase treasury revenues , Because of its broad tax base, as it imposes on the consumption of locally produced and imported goods, in addition to the role played by this tax in support of the local product              &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
Media awareness and its role in building the student's personality
...Show More Authors

The problem of the study crystallized in the following main question: What is the role of media awareness in building the student’s personality according to the opinions of a sample of middle school students? The importance of the research derives from the importance of media awareness being an important variable in building the student’s personality. The sample size was (50) students at Al-Kadhimiya Al-Sabahiya Preparatory School for Boys. In this research, a scale was used to measure the role of media awareness in building personality through (16) items on three axes (cognitive, skill, emotional), and the validity and reliability of this scale were extracted, and the results showed the following:

 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Indian Journal Of Public Health Research &amp; Development
Prevalence of Urinary Tract Infections in Adult and Child Patients
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Almost and Strongly Almost Approximately Nearly Quasi Compactly Packed Modules
...Show More Authors

In this paper, we present the almost approximately nearly quasi compactly packed (submodules) modules as an application of the almost approximately nearly quasiprime submodule. We give some examples, remarks, and properties of this concept. Also, as the strong form of this concept, we introduce the strongly, almost approximately nearly quasi compactly packed (submodules) modules. Moreover, we present the definitions of almost approximately nearly quasiprime radical submodules and almost approximately nearly quasiprime radical submodules and give some basic properties of these concepts that will be needed in section four of this research. We study these two concepts extensively.

View Publication Preview PDF
Crossref
Publication Date
Sat Jul 03 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Comparison between VG-levy and Kernel function estimation with application
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref