Preferred Language
Articles
/
jeasiq-1131
Notes on estimation of ARMA model (1.1) And ARMA (0,1)
...Show More Authors

By driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign   and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root      gives invertible model and when the sign is negative means the root      gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 10 2025
Journal Name
Journal Of Engineering
Application of Mathematical Drilling Model on Southern Iraqi Oil Fields
...Show More Authors

View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Proceedings Of The 2020 2nd International Conference On Sustainable Manufacturing, Materials And Technologies
The impact of toxicant on the food chain ecological model
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Wed Dec 30 2015
Journal Name
Mathematical Theory And Modeling
On the stability of an SIS epidemic model involving treatment
...Show More Authors

The objective of this paper is to study the stability of SIS epidemic model involving treatment. Two types of such eco-epidemiological models are introduced and analyzed. Boundedness of the system is established. The local and global dynamical behaviors are performed. The conditions of persistence of the models are derived.

View Publication Preview PDF
Publication Date
Thu Dec 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of computerized planning on audit performance (Proposed model)
...Show More Authors

The development of technology used in computerized programs is considered on of the most important topics that is responsible for creating tools that can be used in the business environment, the audit profession is one of those professions that received this development. In order for this profession to be more effective, there must be a tool based on sound (correct) scientific basis that can be based upon to enhance the quality of auditing. The research also aims to propose a computerized program to plan the auditing process according to the methods appropriate to the working environment in the audit offices and companies in Iraq. The computerized program was applied to the research sample and the hypothesis of the research has been prov

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
On (ɱ,ɳ)-Strongly Fully Stably Banach Algebra Modules Related to an Ideal of Am ×ɳ
...Show More Authors

The aim of this paper is introducing the concept of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal. Some properties of (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal have been studied and another characterizations have been given. The relationship of (ɱ,ɳ) strong full stability B-Algebra-module related to an ideal that states,  a B- -module Ӽ is (ɱ,ɳ)- strong full stability B-Algebra-module related to an ideal  , if and only if  for any two ɱ-element sub-sets and of Ӽɳ, if , for each j = 1, …, ɱ,  i = 1,…, ɳ  and   implies ɳ( ) ɳ(  have been proved..

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Synthesis, Characterization, and Investigation the Inhibitory Impact of Thiosemicarbazide Derivative toward the Corrosion of Mild Steel in Acidic Media
...Show More Authors

        In this study we focused on the determination of influence the novel synthesized thiosemicarbazide derivative "2-(2-hydroxy-3-methoxybenzylidene) hydrazinecarbothioamide" (HMHC) influenced the corrosion inhibition of mild steel (MS) in a 1.0 M hydrochloric acid acidic solution.This is in an effort to preserve the metal material by maintaining it from corrosion.The synthesized inhibitor was characterized using elemental analysis, and NMR-spectroscopy. Then the corrosion inhibition capability of (HMHC) was studied on mild steel in an acidic medium by weight loss technique within variables [temperature, inhibitor concentration, and time]. The immersion periods were [1:00, 3:00, 5:00, 10:00, 24:00, and 72:00] hours and the tem

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Addie and Shayer Model on the Achievement of Fifth Grade Students and their Attitudes towards History: The Effect of the Addie and Shayer Model on the Achievement of Fifth Grade Students and their Attitudes towards History
...Show More Authors

Abstract

The current research aims to examine the effect of the Adi and Shayer model on the achievement of fifth-grade students and their attitudes toward history. To achieve the research objective, the researcher has adopted two null hypotheses. 1) there is no statistically significant difference at the level of (0.05) between the average score of students of the experimental group who study the history of Europe and modern American history according to the model of Addie and Shayer, and the average scores of the students of the control group who study the same subjects according to the traditional method in the test of post-achievement. 2) There was no statistically significant difference at the level (

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Journal Of The College Of Education For Women
The Complex Relationship Between Darwinism, Geopolitics and Geographic Colonization Research the Relationship Between Geopolitics and Ethnography
...Show More Authors

Research on geopolitical and geopolitical studies relates to a range of sciences that can be called auxiliary sciences, such as political science, international relations in particular, and history, but their focus is rarely on science and ethnography

That the issues and problems of the world today has become so large and complex that does not allow a specific field or knowledge to solve one of the need for the newly known knowledge integration (geopolitics and geopolitics) in particular to move towards cognitive integration to understand many of the problems and global issues that faced The importance of this study comes to clarify the relationship between Darwinism, geopolitics and geopolitics. The geopolitics in modern terms d

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Journal Of Environmental Accounting And Management
On the Food Chain Model with Sokol Howell Functional Response and Prey Refuge
...Show More Authors

The cheif aim of the present investigation is to develop Leslie Gower type three species food chain model with prey refuge. The intra-specific competition among the predators is considered in the proposed model. Besides the logistic growth rate for the prey species, Sokol Howell functional response for predation is chosen for our model formulation. The behaviour of the model system thoroughly analyses near the biologically significant equilibria. The linear stability analysis of the equilibria is carried out in order to examine the response of the system. The present model system experiences Hopf bifurcation depending on the choice of suitable model parameters. Extensive numerical simulation reveals the validity of the proposed model.

Scopus (1)
Scopus Clarivate
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref