Preferred Language
Articles
/
phcaNo8BVTCNdQwC4WKq
Data Missing Solution Using Rough Set theory and Swarm Intelligence
...Show More Authors

This paper presents a hybrid approach for solving null values problem; it hybridizes rough set theory with intelligent swarm algorithm. The proposed approach is a supervised learning model. A large set of complete data called learning data is used to find the decision rule sets that then have been used in solving the incomplete data problem. The intelligent swarm algorithm is used for feature selection which represents bees algorithm as heuristic search algorithm combined with rough set theory as evaluation function. Also another feature selection algorithm called ID3 is presented, it works as statistical algorithm instead of intelligent algorithm. A comparison between those two approaches is made in their performance for null values estimation through working with rough set theory. The results obtained from most code sets show that Bees algorithm better than ID3 in decreasing the number of extracted rules without affecting the accuracy and increasing the accuracy ratio of null values estimation, especially when the number of null values is increasing

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 23 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program for the Development of Moral Intelligence among Preparatory Students
...Show More Authors

This current research aims to identify the effectiveness of a training program in developing moral intelligence and mutual social confidence among middle school students. The researcher made a number of hypotheses for this purpose to achieve the goal of the research.                             

The researcher relied on the (Al Zawaida 2011) scale prepared according to Coles (1997), including (60) items, and the mutual social trust scale for (Nazmi 2001) based on Roter's theory including (38) items.               &nbsp

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 28 2023
Journal Name
Al–bahith Al–a'alami
The Future of Television Work in the Light of Artificial Intelligence Challenges an Exploratory Study
...Show More Authors

This research examines the future of television work in light of the challenges posed by artificial intelligence (AI). The study aims to explore the impact of AI on the form and content of television messages and identify areas where AI can be employed in television production. This study adopts a future-oriented exploratory approach, utilizing survey methodology. As the research focuses on foresight, the researcher gathers the opinions of AI experts and media specialists through in-depth interviews to obtain data and insights. The researcher selected 30 experts, with 15 experts in AI and 15 experts in media. The study reveals several findings, including the potential use of machine learning, deep learning, and na

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 02 2018
Journal Name
Iraqi Journal Of Physics
Study of effect acidic solution (HCl) and (EP/Al2O3 & EP/ TiO2) hybrid on thermal conductivity of epoxy resin.
...Show More Authors

This research studies the effect of adding micro, nano and hybrid by ratio (1:1) of (Al2O3,TiO2) to epoxy resin on thermal conductivity before and after immersion in HCl acid for (14 day) with normality (0.3 N) at weight fraction (0.02, 0.04, 0.06, 0.08) and thickness (6mm). The results of thermal conductivity reveled that epoxy reinforced by (Al2O3) and mixture (TiO2+Al2O3) increases with increasing the weight fraction, but the thermal conductivity (k) a values for micro and Nano (TiO2) decrease with increasing the weight fraction of reinforced, while the immersion in acidic solution (HCl) that the (k) values after immersion more than the value in before immersion.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Journal Of Engineering
A comparative Isothermal and Kinetic Study of the Adsorption of Lead (II) from Solution by Activated Carbon and Bentonite
...Show More Authors

This work is aiming to study and compare the removal of lead (II) from simulated wastewater by activated carbon and bentonite as adsorbents with particle size of 0.32-0.5 mm. A mathematical model was applied to describe the mass transfer kinetic.

The batch experiments were carried out to determine the adsorption isotherm constants for each adsorbent, and five isotherm models were tested to choose the best fit model for the experimental data. The pore, surface diffusion coefficients and mass transfer coefficient were found by fitting the experimental data to a theoretical model. Partial differential equations were used to describe the adsorption in the bulk and solid phases. These equations were simplified and the

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
International Journal Of Advanced Intelligence Paradigms
Assessing IRPS as an efficient pairwise test data generation strategy
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Lecture Notes Of The Institute For Computer Sciences, Social Informatics And Telecommunications Engineering
Sensor Data Classification for the Indication of Lameness in Sheep
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jan 01 2008
Journal Name
Lecture Notes In Computer Science
IRPS – An Efficient Test Data Generation Strategy for Pairwise Testing
...Show More Authors

View Publication
Scopus (20)
Crossref (7)
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref