Preferred Language
Articles
/
ORdZ_ZMBVTCNdQwCEex3
Nadaraya-Watson Estimation of a Circular Regression Model on Peak Systolic Blood Pressure Data
...Show More Authors

Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Error (MCE) criterion was used to compare the two models, leading to the conclusion that the Nadaraya-Watson (NW) circular model outperformed the parametric model in estimating the parameters of the circular regression model. Research, Practical & Social Implications: The recommendation emphasized using the Nadaraya-Watson nonparametric smoothing method to capture the nonlinearity in the data. Originality/value: The results indicated that the Nadaraya-Watson circular model (NW) outperformed the parametric model.      Paper type Research paper.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Dec 25 2015
Journal Name
مجلة اتحاد الجامعات العربية للدراسات والبحوث الهندسية
Smart Sensing for Variable Pressure of Oil Well Safety Valve Using Proportional Pressure Control valve
...Show More Authors

Protection of the oil pipelineswhich extracted from the wells was found to shut the well and prevent the leakage of oil when broken using safety valve. This valve is automatically activated by loss of pressure between the well and pipelines, which take the pressure, signal from hydraulic pressure sensor through pressure control valve which has constant or variable value but it is regulated manually. The manual regulatory process requires the presence of monitoring workers continuously near the wells which are always found in remote areas. In this paper, a smart system has been proposed that work with proportional pressure control valve and also electronic pressure sensor through Arduino controller, which is programmed in a way that satisfie

... Show More
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Asian Multicultural Research For Social Sciences Study
Remote Data Auditing in a Cloud Computing Environment
...Show More Authors

In the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv

... Show More
View Publication
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Implementation of Univariate Paradigm for Streamflow Simulation Using Hybrid Data-Driven Model: Case Study in Tropical Region
...Show More Authors

View Publication
Scopus (89)
Crossref (87)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
MIXED CONVECTION PHENOMINA AFFECTED BY RADIATION IN A HORIZONTAL RECTANGULAR DUCT WITH COCENTRIC AND ECCENTRIC CIRCULAR CORE
...Show More Authors

The numerical investigation has been performed to study the radiation affected steady state laminar mixed convection induced by a hot inner varied positions circular core in a horizontal rectangular channel for a fully developed flow. To examine the effects of thermal radiation on thermo fluid dynamics behavior in the eccentric geometry channel, the generalized body fitted co-ordinate system is introduced while the finite difference method is used for solving the radiative transport equation. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function. After validating numerical results for the case without radiation, the detailed rad

... Show More
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Alexandria Engineering Journal
Employing Sisko non-Newtonian model to investigate the thermal behavior of blood flow in a stenosis artery: Effects of heat flux, different severities of stenosis, and different radii of the artery
...Show More Authors

View Publication
Scopus (23)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Asabe
Effects of Pressure and Moisture Content on Bulk Density of Triticale Grain under Compaction
...Show More Authors

Highlights

Compaction of triticale grain with three moisture contents (8%, 12%, and 16% wet basis) was measured at five applied pressures (0, 7, 14, 34, and 55 kPa).

Bulk density increased with increasing pressure for all moisture contents and was significantly (p < 0.0001) dependent on both moisture content and applied pressure.

A Verhulst logistic equation was found to model the changes in bulk density of triticale grain with R2 of 0.986.

The model showed similar beha

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Methods of forecasting demandOn the blood substanceApplied study at the National Blood Transfusion Center
...Show More Authors

The current research deals with short term forecasting of demand on Blood material, and its' problem represented by increasing of forecast' errors in The National Center for Blood Transfusion because using inappropriate method of forecasting by Centers' management, represented with Naive Model. The importance of research represented by the great affect for forecasts accuracy on operational performance for health care organizations, and necessity of providing blood material with desired quantity and in suitable time. The literatures deal with subject of short term forecasting of demand with using the time series models in order to getting of accuracy results, because depending these models on data of last demand, that is being sta

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
An improved neurogenetic model for recognition of 3D kinetic data of human extracted from the Vicon Robot system
...Show More Authors

These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that.  The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (23)
Scopus Clarivate Crossref