Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Error (MCE) criterion was used to compare the two models, leading to the conclusion that the Nadaraya-Watson (NW) circular model outperformed the parametric model in estimating the parameters of the circular regression model. Research, Practical & Social Implications: The recommendation emphasized using the Nadaraya-Watson nonparametric smoothing method to capture the nonlinearity in the data. Originality/value: The results indicated that the Nadaraya-Watson circular model (NW) outperformed the parametric model. Paper type Research paper.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreProtection of the oil pipelineswhich extracted from the wells was found to shut the well and prevent the leakage of oil when broken using safety valve. This valve is automatically activated by loss of pressure between the well and pipelines, which take the pressure, signal from hydraulic pressure sensor through pressure control valve which has constant or variable value but it is regulated manually. The manual regulatory process requires the presence of monitoring workers continuously near the wells which are always found in remote areas. In this paper, a smart system has been proposed that work with proportional pressure control valve and also electronic pressure sensor through Arduino controller, which is programmed in a way that satisfie
... Show MoreIn the current paradigms of information technology, cloud computing is the most essential kind of computer service. It satisfies the need for high-volume customers, flexible computing capabilities for a range of applications like as database archiving and business analytics, and the requirement for extra computer resources to provide a financial value for cloud providers. The purpose of this investigation is to assess the viability of doing data audits remotely inside a cloud computing setting. There includes discussion of the theory behind cloud computing and distributed storage systems, as well as the method of remote data auditing. In this research, it is mentioned to safeguard the data that is outsourced and stored in cloud serv
... Show MoreThe numerical investigation has been performed to study the radiation affected steady state laminar mixed convection induced by a hot inner varied positions circular core in a horizontal rectangular channel for a fully developed flow. To examine the effects of thermal radiation on thermo fluid dynamics behavior in the eccentric geometry channel, the generalized body fitted co-ordinate system is introduced while the finite difference method is used for solving the radiative transport equation. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function. After validating numerical results for the case without radiation, the detailed rad
... Show MoreCompaction of triticale grain with three moisture contents (8%, 12%, and 16% wet basis) was measured at five applied pressures (0, 7, 14, 34, and 55 kPa). Bulk density increased with increasing pressure for all moisture contents and was significantly (p < 0.0001) dependent on both moisture content and applied pressure. A Verhulst logistic equation was found to model the changes in bulk density of triticale grain with R2 of 0.986. The model showed similar beha
The current research deals with short term forecasting of demand on Blood material, and its' problem represented by increasing of forecast' errors in The National Center for Blood Transfusion because using inappropriate method of forecasting by Centers' management, represented with Naive Model. The importance of research represented by the great affect for forecasts accuracy on operational performance for health care organizations, and necessity of providing blood material with desired quantity and in suitable time. The literatures deal with subject of short term forecasting of demand with using the time series models in order to getting of accuracy results, because depending these models on data of last demand, that is being sta
... Show MoreThese days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that. The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the proce
... Show MoreWireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show More