Preferred Language
Articles
/
KRiNEpUBVTCNdQwCLSVc
Deep Bayesian for Opinion-target identification
...Show More Authors

The use of deep learning.

View Publication
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology & Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Audit of accounting disclosure for potential liabilities and contingent obligations In light of the Corona pandemic and its reflection on the auditor's opinion: Applied research in the National Insurance Company
...Show More Authors

Abstract:

                The research aims to identify how to audit potential liabilities and contingent liabilities in light of the pandemic and its reflection on the auditor's report. The research problem is represented by the complexity of the process of checking potential liabilities and contingent liabilities in insurance companies, which was negatively reflected in the auditor's neutral technical opinion. The researchers hypothesize that auditing potential liabilities and contingent liabilities in light of the Corona pandemic is positively reflected in the auditor's report. The research concludes that the process of checking potential liabilities and contingent liabilities is

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Audit of accounting disclosure for potential liabilities and contingent obligations In light of the Corona pandemic and its reflection on the auditor's opinion: . Applied research in the National Insurance Company
...Show More Authors

                 Accounting disclosure is the main means and effective tool for communicating business results to users in support of their decisions, especially those with thought and specialization from academics and professionals in the field of accounting and auditing about the importance of accounting disclosure and transparency in financial reports.

Contingent liabilities represent commitments based on the occurrence of one or more events in the future to confirm the value due, the party entitled to it, the maturity date, or to confirm the existence of the obligation itself, and therefore they should not be recognized as a contingent liability i

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 26 2025
Journal Name
Journal Of Administration And Economics
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree mode

... Show More
View Publication Preview PDF
Publication Date
Sat May 31 2025
Journal Name
Iraqi Journal For Computers And Informatics
Discussion on techniques of data cleaning, user identification, and session identification phases of web usage mining from 2000 to 2022
...Show More Authors

The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Effects of Discharge Current and Target Thickness in Dc-Magnetron Sputtering on Grain Size of Copper Deposited Samples
...Show More Authors

A study of the effects of the discharge (sputtering) currents (60-75 mA) and the thickness of copper target (0.037, 0.055 and 0.085 mm) on the prepared samples was performed. These samples were deposited with pure copper on a glass substrate using dc magnetron sputtering with a magnetic flux density of 150 gauss at the center. The effects of these two parameters were studied on the height, diameter, and size of the deposition copper grains as well as the roughness of surface samples using atomic force microscopy (AFM).The results of this study showed that it is possible to control the specifications of copper grains by changing the discharge currents and the thickness of the target material. The increase in discharge curre

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
2021 Ieee/cvf Conference On Computer Vision And Pattern Recognition Workshops (cvprw)
Alps: Adaptive Quantization of Deep Neural Networks with GeneraLized PositS
...Show More Authors

View Publication
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Bio Web Of Conferences
Forecasting Cryptocurrency Market Trends with Machine Learning and Deep Learning
...Show More Authors

Cryptocurrency became an important participant on the financial market as it attracts large investments and interests. With this vibrant setting, the proposed cryptocurrency price prediction tool stands as a pivotal element providing direction to both enthusiasts and investors in a market that presents itself grounded on numerous complexities of digital currency. Employing feature selection enchantment and dynamic trio of ARIMA, LSTM, Linear Regression techniques the tool creates a mosaic for users to analyze data using artificial intelligence towards forecasts in real-time crypto universe. While users navigate the algorithmic labyrinth, they are offered a vast and glittering selection of high-quality cryptocurrencies to select. The

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Dec 30 2016
Journal Name
Al-kindy College Medical Journal
Deep Vein Thrombosis Predisposing Factors Analysis Using Association Rules Mining
...Show More Authors

Background: DVT is a very common problem with a very serious complications like pulmonary embolism (PE) which carries a high mortality,and many other chronic and annoying complications ( like chronic DVT, post-phlebitic syndrome, and chronic venous insufficiency) ,and it has many risk factors that affect its course, severity ,and response to treatment. Objectives: Most of those risk factors are modifiable, and a better understanding of the relationships between them can be beneficial for better assessment for liable pfatients , prevention of disease, and the effectiveness of our treatment modalities. Male to female ratio was nearly equal , so we didn’t discuss the gender among other risk factors. Type of the study:A cross- secti

... Show More
View Publication Preview PDF