Preferred Language
Articles
/
OBaYi4cBVTCNdQwC_VW0
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Normal Self-injective Hyperrings
...Show More Authors

       In this paper normal self-injective hyperrings are introduced and studied. Some new relations between this concept and essential hyperideal, dense hyperideal, and divisible hyperring are studied. 

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Sep 01 2016
Journal Name
2016 8th Computer Science And Electronic Engineering (ceec)
Class-specific pre-trained sparse autoencoders for learning effective features for document classification
...Show More Authors

View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Science, Technology And Engineering Systems Journal
Bayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
...Show More Authors

Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jan 31 2024
Journal Name
Iraqi Geological Journal
Estimation of Rock Mechanical Properties of the Hartha Formation and their Relationship to Porosity Using Well-Log Data
...Show More Authors

The physical and elastic characteristics of rocks determine rock strengths in general. Rock strength is frequently assessed using porosity well logs such as neutron and sonic logs. The essential criteria for estimating rock mechanic parameters in petroleum engineering research are uniaxial compressive strength and elastic modulus. Indirect estimation using well-log data is necessary to measure these variables. This study attempts to create a single regression model that can accurately forecast rock mechanic characteristics for the Harth Carbonate Formation in the Fauqi oil field. According to the findings of this study, petrophysical parameters are reliable indexes for determining rock mechanical properties having good performance p

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
New sizes of complete (k, 4)-arcs in PG(2,17)
...Show More Authors

              In this paper, the packing problem for complete (  4)-arcs in  is partially solved. The minimum and the maximum sizes of complete (  4)-arcs in  are obtained. The idea that has been used to do this classification is based on using the algorithm introduced in Section 3 in this paper. Also, this paper establishes the connection between the projective geometry in terms of a complete ( , 4)-arc in  and the algebraic characteristics of a plane quartic curve over the field  represented by the number of its rational points and inflexion points. In addition, some sizes of complete (  6)-arcs in the projective plane of order thirteen are established, namely for  = 53, 54, 55, 56.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jun 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Bacterial Contamination of Acrylic Resin Complete Denture : In Vitro Study
...Show More Authors

Background: Cross contamination of dental appliances in the dental clinics and laboratories may potentially be a health hazard to the dental team and the patient. This study aimed to evaluate bacterial contamination of acrylic complete denture as received from dental laboratory before delivery to the patient, and then to evaluate the effectiveness of disinfection with 2% chlorhexidine and Kin denture cleaner tablet. Materials and methods: 45 newly made upper complete dentures undergone biaacterial examination for contamination before delivered to the patient. Samples were examined in two stages, first after finishing and polishing; when collected from the laboratory and before inserting to the patient mouth, second; after the samples were

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Simulation of five methods for parameter estimation and functionExponential distribution reliability
...Show More Authors
The estimation process is one of the pillars of the statistical inference process as well as the hypothesis test, and the assessment is based on the collection of information and conclusions about the teacher or the community's teachers on the basis of the result
... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2009
Journal Name
Baghdad Science Journal
Investigation of the Optical Properties of the Achromatic Quadrupole Lens by Using the Rectangular Potential Distribution Model
...Show More Authors

An optimization calculation is made to find the optimum properties of combined quadrupole lens which consists of electrostatic and magnetic lens. Both chromatic and spherical aberration coefficients are reduced to minimum values and the achromatic aberration is found for many cases. These calculations are achieved with the aid of transfer matrices method and using rectangular model of field distribution, where the path of charged-particles beam traversing the field has been determined by solving the trajectory equation of motion and then the optical properties for lens have been computed with the aid of the beam trajectory along the lens axis. The computations have been concentrated on determining the chromatic and spher

... Show More
View Publication Preview PDF
Crossref