Preferred Language
Articles
/
bsj-1343
Using fuzzy logic for estimating monthly pan evaporation from meteorological data in Emara/ South of Iraq
...Show More Authors

Evaporation is one of the major components of the hydrological cycle in the nature, thus its accurate estimation is so important in the planning and management of the irrigation practices and to assess water availability and requirements. The aim of this study is to investigate the ability of fuzzy inference system for estimating monthly pan evaporation form meteorological data. The study has been carried out depending on 261 monthly measurements of each of temperature (T), relative humidity (RH), and wind speed (W) which have been available in Emara meteorological station, southern Iraq. Three different fuzzy models comprising various combinations of monthly climatic variables (temperature, wind speed, and relative humidity) were developed to evaluate effect of each of these variables on estimation process. Two error statistics namely root mean squared error and coefficient of determination were used to measure the performance of the developed models. The results indicated that the model, whose input variables are T, W, and RH, perform the best for estimating evaporation values. In addition, the model which is dominated by (T) is significantly and distinctly helps to prove the predictive ability of fuzzy inference system. Furthermore, agreements of the results with the observed measurements indicate that fuzzy logic is adequate intelligent approach for modeling the dynamic of evaporation process.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimator a Smoothing Technique for Estimating Regression Function
...Show More Authors

    The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible models of parametric models and these models were nonparametric models.

    In this manuscript were compared to the so-called Nadaraya-Watson estimator in two cases (use of fixed bandwidth and variable) through simulation with different models and samples sizes.  Through simulation experiments and the results showed that for the first and second models preferred NW with fixed bandwidth fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Numerical Simulation of Unsaturated Soil Water Flow from a Trickle Point System, Considering Evaporation and Root Water Uptake
...Show More Authors

This research was carried out to study the effect of plants on the wetted area for two soil types in Iraq and predict an equation to determine the wetted radius and depth for two different soil types cultivated with different types of plants, the wetting patterns for the soils were predicted at every thirty minute for a total irrigation time equal to 3 hr. Five defferent discharges of emitter and five initial volumetric soil moisture contents were used ranged between field capacity and wilting point were utilized to simulate the wetting patterns. The simulation of the water flow from a single point emitter was completed by utilized HYDRUS-2D/3D software, version 2.05. Two methods were used in developing equations to predict the domains o

... Show More
View Publication
Crossref
Publication Date
Sun Aug 06 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Monthly variation in the qualitative and qualitative Composition of zooplankton (Copepoda , Cladocera) In Diyala river and and two of its branches
...Show More Authors

       The seasonal variation of two groups of Zooplankton were studied in Diyala river and two branches , about 30Km from Diyala dam   It was found that there are differences in the distribution of the two groups . Atotal of six species were identified of Copepoda in Diyala river and its two branches . The species are Cyclops vernalis .  C . visinus , C . dimorphus , Mesocyclops  laukartu ,Paracyclops affinis and Diaptomus reighardi , where recorded high annual density in Khalis stream . Its annual density was between 0.55 – 20.66 Ind . / L.           Wheras, Cladocera group 14 species were identified . and the most disturbance spe

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of classical method and optimization methods for estimating parameters in nonlinear ordinary differential equation
...Show More Authors

 ABSTRICT:

  This study is concerned with the estimation of constant  and time-varying parameters in non-linear ordinary differential equations, which do not have analytical solutions. The estimation is done in a multi-stage method where constant and time-varying parameters are estimated in a straight sequential way from several stages. In the first stage, the model of the differential equations is converted to a regression model that includes the state variables with their derivatives and then the estimation of the state variables and their derivatives in a penalized splines method and compensating the estimations in the regression model. In the second stage, the pseudo- least squares method was used to es

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Data Analysis Techniques And Strategies
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Sat Nov 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Derivationof Mathematical Equations to Calculate the Geographical Coordinates ofUnknown Position SituatedataDistance from the Observer Position Using GPS Data
...Show More Authors

Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors