Preferred Language
Articles
/
MBfWN48BVTCNdQwCDWMt
The Influence of NMI against Modularity in Community Detection Problem: A Case Study for Unsigned and Signed Networks
...Show More Authors

Community detection is useful for better understanding the structure of complex networks. It aids in the extraction of the required information from such networks and has a vital role in different fields that range from healthcare to regional geography, economics, human interactions, and mobility. The method for detecting the structure of communities involves the partitioning of complex networks into groups of nodes, with extensive connections within community and sparse connections with other communities. In the literature, two main measures, namely the Modularity (Q) and Normalized Mutual Information (NMI) have been used for evaluating the validation and quality of the detected community structures. Although many optimization algorithms have been implemented to unfold the structures of communities, the influence of NMI on the Q, and vice versa, between a detected partition and the correct partition in signed and unsigned networks is unclear. For this reason, in this paper, we investigate the correlation between Q and NMI in signed and unsigned networks. The results show that there is no direct relationship between Q and NMI in both types of networks.

Scopus Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Organizational Performance Evaluation Maysan Water Directorate - Case Study
...Show More Authors

The research aims to improve the performance of the Directorate of Maysan water by reconciling the objectives of the employees of the directorate with the objectives of the Directorate itself, as well as to identify the strengths and weaknesses in the performance of the Directorate (Leadership - Individuals - Knowledge - Operations - Financial) and presented to experts and arbitrators of specialized, and the researchers have relied on the case study methodology as a descriptive approach is comprehensive analysis, and draws on more than one approach, method and scientific design, has been interviewed a number of experts in the Directorate Maysan's water Identify the weaknesses and strengths of the Directorate, the research has rea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The influence of cavity design for cusp coverage on fracture strength of weakened maxillary first premolars using two esthetic restorative systems (CAD/CAM hybrid ceramic and nanohybrid composite) (An in vitro study)
...Show More Authors

Background: Maxillary first premolar with wide MOD cavity more susceptible to fracture. The aim of this study was to assess the influence of cavity design for cusp coverage on the fracture resistance of weakened maxillary first premolar restored with CAD/CAM hybrid ceramic versus nanohybide composite. Materials and Methods: Fifty six intact maxillary first premolars of approximately comparable sizes were divided into seven groups eight for each: Group A: Intact teeth (control group); Group B: teeth prepared for MOD inlay; Group C: teeth prepared for MOD onlay covering the lingual cusp; Group D: teeth prepared for MOD covering buccal and lingual cusps ,the previous three groups indirectly restored with nanohybrid composite (3M ESPE Z 250 X

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
The Effect of Urban Land Use Changing on Green Area Neighborhoods No. 336 & 338 in Baghdad – Case Study
...Show More Authors

The role of the green areas lies in being one of the systems that plays the vital role in achieving the environmental dimension besides the socio-cultural body and the economic dimension in the hidden value of ecosystem services. However, many developing countries are characterized by a state of low community environmental awareness, which coincides with the basic need for land for housing and other uses, to take precedence over nature protection strategies. In the absence of clear planning and long-term planning strategies, all this led to abuses and violations of urban land use. In Iraq, the situation became more apparent due to the political, security and social conditions that followed the year 2003. Hence, the resea

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jun 03 2022
Journal Name
Journal Ofxi'an University Of Architecture & Technology
Extent of mathematics teachers' appreciation of the mathematical problem `multiple solutions
...Show More Authors

Aims to find out the (Extent of mathematics teachers' appreciation of the mathematical problem `multiple solutions) Research sample consisted of (100) mathematics teachers distributed on the General Directorates of Education in Baghdad (Rusafa 1/2/3) and (Karkh 1/2/ 3) There was two research approach which are: The first - two different answers of students to the same issue where teachers must assess each answer and explain which one the teacher will accept and why? The second - Different solutions of students' to the same issue, including wrong answers , Teachers should correct the answers and give them final grades (0-10). Descriptive and analytical Approch was used in this research methodology And zero hypotheses, which are as f

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The security environment in Northeast Asia between American authority and Chinese influence
...Show More Authors

The security environment for Northeast Asia is extremely important, as it includes most of the international actors (United States of America, China, Russian Federation and Japan), which gives the nature of the interactions of these forces a special importance for the region.

Because of the multiplicity of policies and interests of the active forces in the region, the result has been an unstable regional environment where the interests of the major powers often clash repeatedly on many related issues, which is coupled with the growing efforts of many powers to adopt policies that differ from what they did in the past This resulted in different patterns of relations, which were mainly characterized by competition over regional lea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The role of administrative supervision scope and the single window to increase the efficiency of investment (Case study: Sudanese Ministry of Investment)
...Show More Authors

Investment drives the wheel of the development of different developed and developing countries. Sudan is a model for a developing country facing a lot of difficulties in the field of both local and foreign investment. The present study was focused on the problem of poor diversification and efficiency of both local and foreign investment in Sudan. Also, it clarified the important role of administrative supervision to strengthen the efficiency of investment, taking the experience of the Sudan as a model. The researchers used the well-known descriptive and analytical tools (questionnaire, interview, observation) to complete this study. A well designed questionnaire was used. It included all questions that could cover all aspects of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 06 2022
Journal Name
Ijci. International Journal Of Computers And Information
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A study for Bacterial Infection in Acute Diarrhea Patients
...Show More Authors

500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
A study of Nutritional and Chemical Content in One Kind Chamomile Tea for Infant and Children
...Show More Authors

This study has been performed for knowing the nutritional and chemical content of one kind chamomile tea for infant and children available in the pharmacy. The results have been showed that the percentage of essential compounds which represented with moisture, protein, fat, carbohydrate, ash and calories as 7.09%,0.01%,0.01%,92,81%, 0.08% and 371,37 Kal./100g, respectively of dry weight. Also the results have been showed that the percentage of chamomile plant extract that added to the tea as 5.74%. And the result of chemical test for effective materials in alcoholic extract showed consist Tannis, Glycosides, Flavonoids, Alkialoids,and Resins.

View Publication Preview PDF