Preferred Language
Articles
/
_hfSHo4BVTCNdQwCqzHr
Multivariate Analysis - Second Edition
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the current second edition 2024). Chapter six introduces mean vector estimation and covariance matrix estimation. Chapter seven devotes to testing concerning mean: one sample mean, and two sample mean. Chapter eight discusses special case of factorial analysis which is principal components analysis. Chapter nine deals with discriminant analysis. While chapter ten deals with cluster analysis. Many solved examples are intended in this book, in addition to a variety of unsolved relied problems at the end of each chapter to enrich the statistical knowledge of the readers.

Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 05 2010
Journal Name
Baghdad Science Journal
Pre-Test Single and Double Stage Shrunken Estimators for the Mean of Normal Distribution with Known Variance
...Show More Authors

This paper is concerned with pre-test single and double stage shrunken estimators for the mean (?) of normal distribution when a prior estimate (?0) of the actule value (?) is available, using specifying shrinkage weight factors ?(?) as well as pre-test region (R). Expressions for the Bias [B(?)], mean squared error [MSE(?)], Efficiency [EFF(?)] and Expected sample size [E(n/?)] of proposed estimators are derived. Numerical results and conclusions are drawn about selection different constants included in these expressions. Comparisons between suggested estimators, with respect to classical estimators in the sense of Bias and Relative Efficiency, are given. Furthermore, comparisons with the earlier existing works are drawn.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Theoretical Study of Elastic Electron Scattering from 8B, 17Ne, 11Be and 11Li Halo Nuclei
...Show More Authors

     The nuclear density distributions and size radii are calculated for one-proton 8B, two-proton 17Ne, one-neutron 11Be and two-neutron 11Li halo nuclei. The theoretical outlines of calculations assume that the nuclei understudy are composed of two parts: the stable core and the unstable halo. The core part is studied using the radial wave functions of harmonic-oscillator (HO) potentials, while the halo is studied through Woods-Saxon (WS) potential. The long tail behaviour which is the main characteristic of the halo nuclei are well generated in comparison with experimental data. The calculated size radii are in good agreement with experimental values. The elastic electron scattering form

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Authentication of Digital Video Encryption
...Show More Authors

The security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Compare Estimate Methods of Parameter to Scheffʼe Mixture Model By Using Generalized Inverse and The Stepwise Regression procedure for Treatment Multicollinearity Problem
...Show More Authors

Mixture experiments are response variables based on the proportions of component for this mixture. In our research we will compare the scheffʼe model with the kronecker model for the mixture experiments, especially when the experimental area is restricted.

     Because of the experience of the mixture of high correlation problem and the problem of multicollinearity between the explanatory variables, which has an effect on the calculation of the Fisher information matrix of the regression model.

     to estimate the parameters of the mixture model, we used the (generalized inverse ) And the Stepwise Regression procedure

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On A Bitopological (1,2)*- Proper Functions
...Show More Authors

   In this paper, we introduce a new type of functions in bitopological spaces, namely, (1,2)*-proper functions. Also, we study the basic properties and characterizations of these functions . One of the most important of equivalent definitions to the (1,2)*-proper functions is given by using (1,2)*-cluster points of filters . Moreover we define and study (1,2)*-perfect functions and (1,2)*-compact functions in bitopological spaces and we study the relation between (1,2)*-proper functions and each of (1,2)*-closed functions , (1,2)*-perfect functions and (1,2)*-compact functions and we give an example when the converse may not be true .
 

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Aip Conference Proceedings
Temperature dependence energy distribution function for proton-tritium fusion reaction
...Show More Authors

The physical behavior for the energy distribution function (EDF) of the reactant particles depending upon the gases (fuel) temperature are completely described by a physical model covering the global formulas controlling the EDF profile. Results about the energy distribution for the reactant system indicate a standard EDF, in which it’s arrive a steady state form shape and intern lead to fix the optimum selected temperature.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Engineering
Experimental Evaluation of the Strut-and-Tie Model Applied to Deep Beam with Near-Load Openings
...Show More Authors

It is commonly known that Euler-Bernoulli’s thin beam theorem is not applicable whenever a nonlinear distribution of strain/stress occurs, such as in deep beams, or the stress distribution is discontinuous. In order to design the members experiencing such distorted stress regions, the Strut-and-Tie Model (STM) could be utilized. In this paper, experimental investigation of STM technique for three identical small-scale deep beams was conducted. The beams were simply supported and loaded statically with a concentrated load at the mid span of the beams. These deep beams had two symmetrical openings near the application point of loading. Both the deep beam, where the stress distribution cannot be assumed linear, and the ex

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Elastic Electron Scattering From Unstable Neutron-Rich P19PC Exotic Nucleus
...Show More Authors

The ground state proton, neutron, and matter density distributions and corresponding root-mean-square (rms) of P19PC exotic nucleus are studied in terms of two-frequency shell model (TFSM) approach. The single-particle wave functions of harmonic-oscillator (HO) potential are used with two different oscillator parameters bRcoreR and bRhaloR. According to this model, the core nucleons of P18PC nucleus are assumed to move in the model space of spsdpf. The shell model calculations are carried out for core nucleons with w)20(+ truncations using the realistic WBP
interaction. The outer (halo) neutron in P
19
PC is assumed to move in the pure 2sR1/2R-
orbit. The halo structure in P
19
PC is confirmed with 2sR1/2R-dominant c

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 28 2019
Journal Name
Iraqi Journal Of Science
Estimate the Two Parameters of Gamma Distribution Under Entropy Loss Function
...Show More Authors

In this paper, Bayes estimators for the shape and scale parameters of Gamma distribution under the Entropy loss function have been obtained, assuming Gamma and Exponential priors for the shape and scale parameters respectively. Moment, Maximum likelihood estimators and Lindley’s approximation have been used effectively in Bayesian estimation. Based on Monte Carlo simulation method, those estimators are compared depending on the mean squared errors (MSE’s). The results show that, the performance of the Bayes estimator under Entropy loss function is better than other estimates in all cases.   

View Publication Preview PDF