Improving Machine Learning Performance by Eliminating the Influence of Unclean Data
Improving Machine Learning Performance by Eliminating the Influence of Unclean Data

Murtadha B. Ressan; Rehab F. Hassan

Volume 40, Issue 4 , April 2022, , Page 546-539

https://doi.org/10.30684/etj.v40i4.2010

Abstract
  Regardless of the data source and type (text, digital, photo group, etc.), they are usually unclean data. The term (unclean) means that data contains some bugs and paradoxes that can ...  Read More ...
Determination Efficient Classification Algorithm for Credit Card Owners: Comparative Study
Determination Efficient Classification Algorithm for Credit Card Owners: Comparative Study

Raghad A. Azeez

Volume 39, 1B , March 2021, , Page 21-29

https://doi.org/10.30684/etj.v39i1B.1577

Abstract
  Today in the business world, significant loss can happen when the borrowers ignore paying their loans. Convenient credit-risk management represents a necessity for lending institutions. ...  Read More ...
Effect of Aging Time on Deformation Behavior of Lead-Free and Lead Base Solders Alloys
Effect of Aging Time on Deformation Behavior of Lead-Free and Lead Base Solders Alloys

Alaa H. Ali

Volume 36, 8A , August 2018, , Page 853-866

https://doi.org/10.30684/etj.36.8A.4

Abstract
  The effect of aging time on the deformation behavior of lead-free and lead- based sub-mm solder alloys were investigated. Experimental results showed that the aging time (less than ...  Read More ...
Employee Performance Assessment Using Modified Decision Tree
Employee Performance Assessment Using Modified Decision Tree

Hassan A. Jeiad; Zinah J. M. Ameen; Alza A. Mahmood

Volume 36, 7A , July 2018, , Page 806-811

https://doi.org/10.30684/etj.36.7A.14

Abstract
  Decision tree algorithms are famous method in inductive learning and successfully applied for model classification and prediction. Performance evaluation in organization is one of the ...  Read More ...
Proposed Parallel Association Rules Algorithm
Proposed Parallel Association Rules Algorithm

Emad kadhiem Jabbar; Waheed Abd Al-Kadhiem Salman

Volume 32, 1B , January 2014, , Page 157-168

https://doi.org/10.30684/etj.32.1B.18

Abstract
  Data mining is an advanced technique for extracting knowledge from a large amount of data for classification, prediction, estimation, clustering or association rules or any activities, ...  Read More ...
Classification of Images Using Decision Tree
Classification of Images Using Decision Tree

Emad K. Jabbar; Mayada jabbar kelain

Volume 31, 6 B , June 2013, , Page 728-739

https://doi.org/10.30684/etj.31.6B.5

Abstract
  In this paper, the proposed system is based on texture features classification for multi object images by using decision tree (ID3) algorithm. The proposed system uses image segment ...  Read More ...
Genetic Based Method for Mining Association Rules
Genetic Based Method for Mining Association Rules

Bushra Khireibut Jassim

Volume 31, 3B , March 2013, , Page 325-331

https://doi.org/10.30684/etj.31.3B.5

Abstract
  In this paper genetic based method proposed for mining association rule, the benefit of this method it mining association rule in one step and it does not require the user-specified ...  Read More ...
A Proposal to Detect Computer Worms (Malicious Codes) Using Data Mining Classification Algorithms
A Proposal to Detect Computer Worms (Malicious Codes) Using Data Mining Classification Algorithms

Soukaena Hassan Hashim; Inas Ali Abdulmunem

Volume 31, 2 B , February 2013, , Page 142-155

https://doi.org/10.30684/etj.31.2B.3

Abstract
  Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer ...  Read More ...
Privacy Preserving for Data Mining Applications
Privacy Preserving for Data Mining Applications

Soukaena Hassan Hashem; Alaa H. AL-Hamami

Volume 26, Issue 5 , May 2008, , Page 552-564

https://doi.org/10.30684/etj.29.5.8

Abstract
  The results of data Mining (DM) such as association rules, classes, clusters,etc, will be readily available for working team. So the mining will penetrate theprivacy of sensitive data ...  Read More ...