Preferred Language
Articles
/
5xc_bZIBVTCNdQwCxa9H
Solving multicollinearity problem of gross domestic product using ridge regression method
...Show More Authors

This study is dedicated to solving multicollinearity problem for the general linear model by using Ridge regression method. The basic formulation of this method and suggested forms for Ridge parameter is applied to the Gross Domestic Product data in Iraq. This data has normal distribution. The best linear regression model is obtained after solving multicollinearity problem with the suggesting of 10 k value.

Scopus
Publication Date
Tue Nov 03 2020
Journal Name
Modern Sport
Effect of using flat hierarchical method on some aspects of muscular strength and straight serve skill for nascent tennis players
...Show More Authors

The researcher focused on the importance of the physical abilities of the tennis game, as this game is one of the games that are characterized by its specificity in performance as this game is characterized by continuous movement and dealing with different elements, so this game requires the development of muscle strength, which plays an important role in Performance skills in the game of tennis. There are several methods to develop strength, including flat hierarchical technique, which is one of the most common forms of training in the development of muscle strength.     As for the research problem, the researcher found a method that has an effect on the development of force. Therefore, the researcher tried to diversify a

... Show More
Crossref (1)
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Optimization of Friction Stir Welding Process Parameters of Dissimilar AA2024-T3 and AA7075-T73 Aluminum Alloys by Using Taguchi Method
...Show More Authors

The aim of present study is to determine the optimum parameters of friction stir welding process and known the most important parameter along with percentage contribution of each parameter which effect on tensile strength and joint efficiency of FS welded joint of  dissimilar aluminum alloys AA2024-T3 and AA7075-T73 of 3 mm thick plates by applied specific number of experiments using Taguchi method .AA2024 was placed on the advancing side and AA7075 on the retreating side. FSW was achieved under three different rotation speeds (898, 1200 and 1710) rpm, three different welding speeds (20, 45 and 69) mm\min , three different pin profiles (cylindrical, threaded cylindrical and cone) and tool tilt angle 2. Taguchi method w

... Show More
View Publication Preview PDF
Publication Date
Tue May 30 2023
Journal Name
Iraqi Journal Of Science
Coating of Carbon Nanotubes Using Chemical Method to Enhance the Corrosion Protection of Copper and Aluminum Metals in Seawater Medium
...Show More Authors

     In this study, carbon nanotubes were prepared using a pure chemical method modified similar to the Hummers method with simple changes in the work steps. The carbon nanotubes were then coated and reduced on copper and aluminum metals using the electrodeposition method (EDP) for corrosion protection application in seawater medium (NaCl 3.5%) at four different temperatures: 20, 30, 40, and 50 °C, which were studied using three electrode potentiostats. All corrosion measurements, thermodynamics, and kinetics parameters were nominated from Tafel plots. The films deposited by the carbon nanotubes were examined by the SEM technique, and this technique showed the formation of carbon nanotubes.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
X.K.N: A Proposed Method for Data Encryption Using XOR and NOT Logical Gates with LFSR Generated Keys
...Show More Authors

In this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.

View Publication Preview PDF
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Using the Elzaki decomposition method to solve nonlinear fractional differential equations with the Caputo-Fabrizio fractional operator
...Show More Authors

The techniques of fractional calculus are applied successfully in many branches of science and engineering, one of the techniques is the Elzaki Adomian decomposition method (EADM), which researchers did not study with the fractional derivative of Caputo Fabrizio. This work aims to study the Elzaki Adomian decomposition method (EADM) to solve fractional differential equations with the Caputo-Fabrizio derivative. We presented the algorithm of this method with the CF operator and discussed its convergence by using the method of the Cauchy series then, the method has applied to solve Burger, heat-like, and, couped Burger equations with the Caputo -Fabrizio operator. To conclude the method was convergent and effective for solving this type of

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of some of the success factors and product strategies Applied Research in the industrial sector of the Iraqi
...Show More Authors

This research deals with the study of the relationship between the success factors as the independent variable and product strategies as the dependent variable , has reacted to these variables to form the frame , which is the research which centered research problem about the extent to which industrial companies the vision and knowledge of Muslim women survive and develop in the business market , which can be expressed about the extent of awareness of corporate success factors and the use of product strategies and what the relationship between the factors and strategies , while expressing the importance of research to make the focus on the product occupies a paramount importance in the industrial sector companies in relation to t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
New White Method of Parameters and Reliability Estimation for Transmuted Power Function Distribution
...Show More Authors

        In this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3)  of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparing the Sequential Nonlinear least squared Method and Sequential robust M method to estimate the parameters of Two Dimensional sinusoidal signal model:
...Show More Authors

Estimation of the unknown parameters in 2-D sinusoidal signal model can be considered as important and difficult problem. Due to the difficulty to find estimate of all the parameters of this type of models at the same time, we propose sequential non-liner least squares method and sequential robust  M method after their development through the use of sequential  approach in the estimate suggested by Prasad et al to estimate unknown frequencies and amplitudes for the 2-D sinusoidal compounds but depending on Downhill Simplex Algorithm in solving non-linear equations for the purpose of obtaining non-linear parameters estimation which represents frequencies and then use of least squares formula to estimate

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of The Faculty Of Languages
A Psychological Reading of The Problem of the Black in John Steinbeck’s Of Mice and Men
...Show More Authors