Preferred Language
Articles
/
FxdQnpABVTCNdQwCtI9X
The Use Of Genetic Algorithm In Estimating The Parameter Of Finite Mixture Of Linear Regression
...Show More Authors

The estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To deal with this type of problem, a mixture of linear regression is used to model such data. In this article, we propose a genetic algorithm-based method combined with (MM-estimator), which is called in this article (RobGA), to improve the accuracy of the estimation in the final stage. We compare the suggested method with robust bi-square (MixBi) in terms of their application to real data representing blood sample. The results showed that RobGA is more efficient in estimating the parameters of the model than the MixBi method with respect to mean square error (MSE) and classification error (CE).

Crossref
View Publication
Publication Date
Wed May 24 2023
Journal Name
College Of Islamic Sciences
Metaphor in the interpretation of the long sea of Ibn Ajiba
...Show More Authors

Scientists have delved too much into reality and metaphor, and perhaps a topic of Arabic rhetoric has not received the attention and care of scholars as much as the topic of truth and metaphor. The metaphor opens wide horizons of expression in front of the writer so that he has several means by which he can express the one experience, so his imagination takes off depicting the intelligible as tangible, the seen as audible, and the audible as seen. That image presented by the creative writer.
The first thing to note is that the emergence of metaphor as a rhetorical term was at the hands of the Mu'tazila. Muslims differed about the issue of metaphor in the Holy Qur’an, and the beginning of the dispute was about the verses in which the

... Show More
View Publication
Publication Date
Fri Dec 31 2021
Journal Name
Political Sciences Journal
The Effect of the change of Energy Factor on the American-Russian Competition in Europe
...Show More Authors

Receipt date:3/13/2021 accepted date:5/26/2021 Publication date:12/31/2021

Creative Commons License This work is licensed under a Creative Commons Attribution 4.0 International License.

energy is one of the strategic resources within international politics, and this is through the existing competition between the international powers on it, and the global powers have begun to rely on interest in new areas, such as import, depending on new projects an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
The problem of elevating the status of values in scienceStudy in economic thought and macro analysis
...Show More Authors

ان من اهم القضايا التي تثيرها المعرفة البشرية في تجلياتها، وتعبيراتها المفاهيمية، تكمن في مدى تأصلها وانتمائها الى البنى والتشكيلات الموضوعية (في مستوياتها التاريخية) التي تسعى لتفسيرها وادراكها ومضاهاتها. فالينبوع الذي يغرف منه الفكر مادته هو الكيان الاجتماعي المتموضع خارج الوعي والايدولوجيا.

ان قدرة الوعي على ادراك الواقع الموضوعي بخصائصه العامة يشكل الشرط  الضروري لاكتساب الوعي ل

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 31 2017
Journal Name
Journal Of Engineering
Development of an On-Line Self-Tuning FPGA-PID-PWM Control Algorithm Design for DC-DC Buck Converter in Mobile Applications
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Mar 10 2011
Journal Name
Tikrit Journal Of Agricultural Sciences
ESTIMATION OF GENE ACTION AND GENETIC PARAMETERS FOR SOME VEGETATIVE AND FLOWERY GROWTH CHARACTERS IN SUMMER SQUASH (Cucurbita pepo L.) BY USING MEAN GENERATION ANALYSIS
...Show More Authors

An experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of vegetative and flowery growth in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1 = cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three

... Show More
Publication Date
Wed Dec 30 2020
Journal Name
Journal Of Planner And Development
The Infrastructure and the Potential of the Tourism Industry in the Holy City of Najaf.
...Show More Authors

The infrastructure is one of the basic components of the tourism industry in Iraq in general and in Najaf in particular, in spite of there are obstacles and problems that which are hindered the development of tourism in Iraq, some of them are related to the  tourism industry itself, some are related to the security and political situation, and some are related to poor management of tourism. However, the infrastructure is considered the cornerstone of the success of the tourism industry in Iraq and other countries, if it is available, it can be a potential indicator of success, and on the contrary, it is a hindrance to go forward. The aim of this research is to shed light on the availability of requirements for the s

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Horizontal Fragmentation for Most Frequency Frequent Pattern Growth Algorithm
...Show More Authors

Abstract: Data mining is become very important at the present time, especially with the increase in the area of information it's became huge, so it was necessary to use data mining to contain them and using them, one of the data mining techniques are association rules here using the Pattern Growth method kind enhancer for the apriori. The pattern growth method depends on fp-tree structure, this paper presents modify of fp-tree algorithm called HFMFFP-Growth by divided dataset and for each part take most frequent item in fp-tree so final nodes for conditional tree less than the original fp-tree. And less memory space and time.

View Publication Preview PDF
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref