Preferred Language
Articles
/
RRdCs40BVTCNdQwC_xm2
Atan regularized for the high dimensional Poisson regression model
...Show More Authors

Variable selection in Poisson regression with high dimensional data has been widely used in recent years. we proposed in this paper using a penalty function that depends on a function named a penalty. An Atan estimator was compared with Lasso and adaptive lasso. A simulation and application show that an Atan estimator has the advantage in the estimation of coefficient and variables selection.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Nov 25 2022
Journal Name
Tem Journal
Preparing of ECG Dataset for Biometric ID Identification with Creative Techniques
...Show More Authors

The Electrocardiogram records the heart's electrical signals. It is a practice; a painless diagnostic procedure used to rapidly diagnose and monitor heart problems. The ECG is an easy, noninvasive method for diagnosing various common heart conditions. Due to its unique advantages that other humans do not share, in addition to the fact that the heart's electrical activity may be easily detected from the body's surface, security is another area of concern. On this basis, it has become apparent that there are essential steps of pre-processing to deal with data of an electrical nature, signals, and prepare them for use in Biometric systems. Since it depends on the structure and function of the heart, it can be utilized as a biometric attribute

... Show More
View Publication
Scopus (9)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2016
Journal Name
International Journal Of Vlsi Design & Communication Systems (vlsics)
SIMULTANEOUS OPTIMIZATION OF STANDBY AND ACTIVE ENERGY FOR SUB THRESHOLD CIRCUITS
...Show More Authors

Increased downscaling of CMOS circuits with respect to feature size and threshold voltage has a result of dramatically increasing in leakage current. So, leakage power reduction is an important design issue for active and standby modes as long as the technology scaling increased. In this paper, a simultaneous active and standby energy optimization methodology is proposed for 22 nm sub-threshold CMOS circuits. In the first phase, we investigate the dual threshold voltage design for active energy per cycle minimization. A slack based genetic algorithm is proposed to find the optimal reverse body bias assignment to set of noncritical paths gates to ensure low active energy per cycle with the maximum allowable frequency at the optimal supply vo

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 09 2020
Journal Name
Construction Research Congress 2020
Alternative Risk Models for Optimal Investment in Portfolio-Based Community Solar
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 28 2019
Journal Name
Journal Of The College Of Education For Women
Alexithymia and its relation with emotional intelleigence for 6th grade students
...Show More Authors

This current study aims to:
1st: The recognizing of Alexithymia level for 6th grade students (Study Specimen) through the next Zero Hypothesis:1. There are no statistically significant differences at (0.05) level between the arithmetic mean of the specimen degrees as a whole and the central assumption for the scale of the lack in emotions expression
2. There are no statistically significant differences at (0.05) level between the arithmetic mean of the male students specimen and the arithmetic meanc of the female students specimen for the scale of Alexithymia.
2nd: ldentification the level of the emotional intelligence among 6th grade students (Study Specimen) through the next Zero Hypothesis:
1) There are no statistically si

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Iraqi Geological Journal
CLIMATIC WATER BALANCE FOR ISHAQI AREA, SALAH AL-DEAN GOVERNORATE, IRAQ
...Show More Authors

In any natural area or water body, evapotranspiration is one of the main outcomes in the water balance equation. It is also a crucial component of the hydrologic cycle and considers as the main requirement in the planning and designing of any irrigation project. The climatic parameters for the Ishaqi area are calculated from the available date of Samarra and Al-Khlais meteorological stations according to a method for the period (1982–2017) according to Fetter method. The results of the mean of rainfall, relative humidity temperature, evaporation, sunshine, and wind speed of the Ishaqi area are 171.96 mm, 49.67%, 24.86 C°, 1733.61 mm, 8.34 h/day, and 2.3 m/sec, respectively. Values of Potential Evapotranspiration are determined by

... Show More
View Publication
Crossref
Publication Date
Thu Mar 31 2022
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Geological Modeling and Resource Estimation for Mishrif Formation in Nasiriyah Oilfield
...Show More Authors

Resource estimation is an essential part of reservoir evaluation and development planning which highly affects the decision-making process. The available conventional logs for 30 wells in Nasiriyah oilfield were used in this study to model the petrophysical properties of the reservoir and produce a 3D static geological reservoir model that mimics petrophysical properties distribution to estimate the stock tank oil originally in place (STOOIP) for Mishrif reservoir by volumetric method. Computer processed porosity and water saturation and a structural 2D map were utilized to construct the model which was discretized by 537840 grid blocks. These properties were distributed in 3D Space using sequential Gaussian simulation and the variation in

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications
...Show More Authors

In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including:  network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Analytical solutions via coupled Elzaki adomian decomposition method for some applications
...Show More Authors

An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has

... Show More
Scopus (4)
Scopus
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Mathematical treatment for solition-soliton interactions in mono-mode optical fiber
...Show More Authors

There are many images you need to large Khneh space With the continued evolution of storage technology for computers, there is a continuing need and are required to reduce Alkhoznip space Pictures Zguet pictures in a good way, the way conversion Alamueja to Purifiers

View Publication Preview PDF