Preferred Language
Articles
/
6hYO6IoBVTCNdQwCSacO
Methods for simultaneous detection of the cyanotoxins BMAA, DABA, and anatoxin-a in environmental samples
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of some robust methods in the presence of problems of multicollinearity and high leverage points
...Show More Authors

Abstract

The multiple linear regression model of the important regression models used in the analysis for different fields of science Such as business, economics, medicine and social sciences high in data has undesirable effects on analysis results . The multicollinearity is a major problem in multiple linear regression. In its simplest state, it leads to the departure of the model parameter that is capable of its scientific properties, Also there is an important problem in regression analysis is the presence of high leverage points in the data have undesirable effects on the results of the analysis , In this research , we present some of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Mar 21 2014
Journal Name
International Journal Of Antennas And Propagation
Development of a Compact Wide-Slot Antenna for Early Stage Breast Cancer Detection Featuring Circular Array Full-View Geometry
...Show More Authors

A novel planar type antenna printed on a high permittivity Rogers’ substrate is proposed for early stage microwave breast cancer detection. The design is based on a p-shaped wide-slot structure with microstrip feeding circuit to eliminate losses of transmission. The design parameters are optimized resulting in a good reflection coefficient at −10 dB from 4.5 to 10.9 GHz. Imaging result using inhomogeneous breast phantom indicates that the proposed antenna is capable of detecting a 5 mm size cancerous tumor embedded inside the fibroglandular region with dielectric contrast between the target and the surrounding materials ranging from 1.7 : 1 to 3.6 : 1.

Publication Date
Fri Dec 01 2023
Journal Name
Case Studies In Construction Materials
Experimental and environmental investigations of the impacts of wood sawdust on the performance of reinforced concrete composite beams
...Show More Authors

View Publication Preview PDF
Scopus (14)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Economics And Administrative Sciences
Modeling Absolute Deviations Method by using Numerical Methods to measure the dispersion of the proposal for error
...Show More Authors

Is in this research review of the way minimum absolute deviations values ​​based on linear programming method to estimate the parameters of simple linear regression model and give an overview of this model. We were modeling method deviations of the absolute values ​​proposed using a scale of dispersion and composition of a simple linear regression model based on the proposed measure. Object of the work is to find the capabilities of not affected by abnormal values by using numerical method and at the lowest possible recurrence.

 

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Kuwait Journal Of Science
Three iterative methods for solving Jeffery-Hamel flow problem
...Show More Authors

In this article, the nonlinear problem of Jeffery-Hamel flow has been solved analytically and numerically by using reliable iterative and numerical methods. The approximate solutions obtained by using the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM). The obtained solutions are discussed numerically, in comparison with other numerical solutions obtained from the fourth order Runge-Kutta (RK4), Euler and previous analytic methods available in literature. In addition, the convergence of the proposed methods is given based on the Banach fixed point theorem. The results reveal that the presented methods are reliable, effective and applicable to solve other nonlinear problems.

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 17 2022
Journal Name
Journal Of Interdisciplinary Mathematics
Study on approximate analytical methods for nonlinear differential equations
...Show More Authors

In this work, an analytical approximation solution is presented, as well as a comparison of the Variational Iteration Adomian Decomposition Method (VIADM) and the Modified Sumudu Transform Adomian Decomposition Method (M STADM), both of which are capable of solving nonlinear partial differential equations (NPDEs) such as nonhomogeneous Kertewege-de Vries (kdv) problems and the nonlinear Klein-Gordon. The results demonstrate the solution’s dependability and excellent accuracy.

Scopus (11)
Scopus
Publication Date
Tue Jun 15 2021
Journal Name
Al-academy
The artistic and performing methods of the sass dance in Baghdad "An Analytical Study": أمير علي رضا
...Show More Authors

The research study includes shedding light on the sas dance in Iraq, as it is one of the popular legacies that are rich in the Mesopotamian civilization and because of the different practices it has in the different occasions on which these dances are held. Which is one of the kinetic arts widespread among the classes of Iraqi society. The researcher explained its features and artistic content that characterizes Iraqi music. The (methodological framework) reviewed the justification, importance and purpose of the research, and the limits of the research that included the (National Troupe of Folk Art) as a human limit to discover the artistic methods of the Sas dance and then define the terms of the search. The "theoretical framework" cont

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Bayesian methods to estimate the failure probability for electronic systems in case the life time data are not available
...Show More Authors

In this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company.  The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system.  This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system.  We calculate the range for each estimator by using the Maximum Likelihood estimator.  We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after  it checked by the

... Show More
View Publication Preview PDF
Crossref