Preferred Language
Articles
/
Zxd7Zo4BVTCNdQwCakbu
Bitcoin Prediction with a hybrid model
...Show More Authors

. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction accuracy criterion and matching curve-fitting in this work demonstrated that if the residuals of the revised model are white noise, the forecasts are unbiased. Future work investigating robust hybrid model forecasting using fuzzy neural networks would be very interesting

Scopus Crossref
View Publication
Publication Date
Wed Jul 01 2015
Journal Name
Political Sciences Journal
The concept of ethnicity in contemporary American political thought Jerry Mueller, a model ...
...Show More Authors

الخلاصة

تشير نظريات علم اجتماع المعرفة الى ان ظهور مفهوم معين او سقوطه لايتم بمحض الصدفة، بل نتيجة تفاعل مجموعة من العوامل الثقافية والسياسية وحتى الاقتصادية ومن هنا فأن ظهور مفهوم الاثنية كان محصلة عوامل كثيرة خصوصاً بعد ان اصبح موضوع الاثنية في العقود الاخيرة من القرن الماضي وبداية القرن الواحد والعشرين محور نقاش رئيس في ميدان البحث الاجتماعي والسياسي، ليس في

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 15 2021
Journal Name
The Journal Of Legal And Social Sciences
The Limitations on the Judge’s Authority in Judicial Interpretation – France as a Model
...Show More Authors

When exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u

... Show More
View Publication
Publication Date
Thu Apr 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Defining the aspects of the local urban sustainability: Eco-cities as a model
...Show More Authors
Abstract<p>The absence of ecological perception in the local urbanization resulted in the lack of a clear conception of achieving sustainability in its simplest form in the urban reality and in the city of Baghdad in particular. The research assumes the possibility of achieving urban sustainability in Iraqi cities by applying the cities for the most effective methods to implemented ecological solutions and introducing appropriate urban planning tools and improve the living environment. The research focuses on the ability to define some aspects to achieve a sustainable local urban identity from global experiences. This was performed by proposing a scheduled theoretical framework, through which th</p> ... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Style ''Affirmative say'' in the holy Quran Ibn Ashour's interpretation is a model
...Show More Authors

Abstract

This study talks about a wonderful Qur'anic style. relates to one of the methods used in it. And it's the rhetorical style:  ''Affirmative say''. It is useful in arguing with the opponent, nullifying his reasoning, and proving the opposite meaning of the opponent. The study will be conducted from a Qur'anic perspective based on the study of examples of it, and partly in interpretive treatment through the book of editing and enlightenment of Taher Ibn Ashour, known for his art in matters of rhetoric and methods of controversy. This is with the rooting of this issue, and the relationship of industrial sciences to it as a Qur'anic style.

Keywords: ''Affirmative say, style, Qur'anic rhetoric, Arabic rhetoric, Co

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (119)
Crossref (98)
Scopus Clarivate Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (29)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
Post-interactive communication A study to build a model for the flow of communication in social networking sites
...Show More Authors

The issue of the research lies in the non-representation of the models developed for the communication process in the interaction and networking processes through social media, as the research sought to build a network model of communication according to the specific data and features of social media platforms in order to reach a special generalization to understand how the process of networking operates in cyberspace.

The researcher followed the analytical survey approach as she described the communication models outwardly in order to be able to build a networked communication model that represents the flow of post-reactive communication. Therefore, it has been named "Nebula - Sadeem" after the concept of post-space and cosmic g

... Show More
View Publication Preview PDF
Crossref (2)
Crossref