Preferred Language
Articles
/
ZhZJSokBVTCNdQwCwoi6
Fuzzy Nonparametric Regression Model Estimation Based on some Smoothing Techniques With Practical Application
...Show More Authors

In this research, we use fuzzy nonparametric methods based on some smoothing techniques, were applied to real data on the Iraqi stock market especially the data about Baghdad company for soft drinks for the year (2016) for the period (1/1/2016-31/12/2016) .A sample of (148) observations was obtained in order to construct a model of the relationship between the stock prices (Low, high, modal) and the traded value by comparing the results of the criterion (G.O.F.) for three techniques , we note that the lowest value for this criterion was for the K-Nearest Neighbor at Gaussian function .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
Goal Conflict among Twelfth-Grade Students based on Gender and Major
...Show More Authors

The aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Construction of Graduation Certificate Issuing System Based on Digital Signature Technique
...Show More Authors

With the development of computer architecture and its technologies in recent years, applications like e-commerce, e-government, e-governance and e-finance are widely used, and they act as active research areas. In addition, in order to increase the quality and quantity of the ordinary everyday transactions, it is desired to migrate from the paper-based environment to a digital-based computerized environment. Such migration increases efficiency, saves time, eliminates paperwork, increases safety and reduces the cost in an organization. Digital signatures are playing an essential role in many electronic and automatic based systems and facilitate this migration. The digital signatures are used to provide many services and s

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 17 2020
Journal Name
International Journal Of Applied Mechanics And Engineering
Analysis of Structural Concrete Bar Members Based on Secant Stiffness Methods
...Show More Authors
Abstract<p>In this paper, the behavior of structural concrete linear bar members was studied using numerical model implemented in a computer program written in MATLAB. The numerical model is based on the modified version of the procedure developed by Oukaili. The model is based on real stress-strain diagrams of concrete and steel and their secant modulus of elasticity at different loading stages. The behavior presented by normal force-axial strain and bending moment-curvature relationships is studied by calculating the secant sectional stiffness of the member. Based on secant methods, this methodology can be easily implemented using an iterative procedure to solve non-linear equations. A compari</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (23)
Crossref (11)
Scopus Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (17)
Scopus
Publication Date
Sat Apr 01 2023
Journal Name
The Ocular Surface
Detecting dry eye from ocular surface videos based on deep learning
...Show More Authors

View Publication
Scopus (20)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Determination of Doxycycline Hyclate by Batch and Reverse Flow Injection Analysis Based on the Oxidative Coupling Reaction with 3-Methyl-2-benzothiazolinone Hydrazone hydrochloride (MBTH)
...Show More Authors

New, simple and sensitive batch and reverse FIA spectrophotometric methods for the determination of doxycycline hyclate in pure form and in pharmaceutical preparations were proposed. These methods based on oxidative coupling reaction between doxycycline hyclate and 3-methylbenzothiazolinone-2-hydrazone hydrochloride (MBTH) in the presence ammonium ceric sulfate in acidic medium, to form green water-soluble dye that is stable and has a maximum absorbance at 626 nm. A calibration graph shows that a Beer's law is obeyed over the concentration range of 1-80 and 0.5-110 ?g.mL-1 of DCH for the batch and rFIA respectively with detection limit of 0.325 ?g.mL-1 of DCH for r-FIA methods. All different chemicals and physical experimental paramete

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
Parental Oral Violence against Their Teen- ager Children and its Relation with Some Variables: Parental Oral Violence against Their Teen- ager Children and its Relation with Some Variables
...Show More Authors

Abstract
The Verbal Violence that is directed towards sons is considered one of
the dehavioural problems that have negative reflections on the personality
of the individual . the increase in the frequency and intensity of that
behavior in the daily life may lead to psychological and behavioural
disturbances, and such behaviourhas to be stooped in an early time before it

leave negative affects on the personality of the teenager which will not be
cured or removed easily .
The family that is represented by the parents has a prominent effect In the
shaping of the teenager's personality , hence forth the normal teenage is
a reflection of a stable family life , relatively empty of disturbances and
unbalanc

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of Educational And Psychological Researches
The effect of Dunn Dunn model on students’ achievement in Geography course
...Show More Authors

The study seeks to investigate the effect of Dunn Dunn learning style model on students’ achievement. Besides, the way of developing students’ deductive thinking by testing the null hypothesis: there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05). Additionally, there is no significant difference between experimental group who takes Dunn Dunn model as style in studying geography and control group that follows a traditional method in studying geography at the level of (0,05) on testing developing deductive thinking skills. The researcher adopted a quasi-experimental posttest

... Show More
View Publication Preview PDF