Preferred Language
Articles
/
jeasiq-1131
Notes on estimation of ARMA model (1.1) And ARMA (0,1)
...Show More Authors

By driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign   and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root      gives invertible model and when the sign is negative means the root      gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 30 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences (ihjpas)
Biochemical Study on Splenectomy and Non Splenectomy Iraqi Major Thalassemic Patients
...Show More Authors

Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
The Ash'aris and their position on faith, An Ideological Study: الايمان
...Show More Authors

 

The Ash'aris and their position on faith, An Ideological Study

Omed AbdulQader rasool               

College of Islamic Sciences/Salahaddin University-Erbil

Abstract

The concept of faith is very complex, and there are a lot of talk about it among the major Islamic groups such as the Kharijites, the Mu'tazila, the Jahmiyya and others, because of its great importance, and the worldly and eschatological effects it entails according to the elements of faith such as recognition, ratification and action.

The researcher chose one sect, which is the

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Financial austerity in Iraq causes and effects on economic performance indicators
...Show More Authors

Abstract:

The Iraqi economy faces complex economic challenges that threaten the prospects for growth and stability in the short and medium term, The decrease in oil revenues on which Iraq is based in financing its total expenditure, both operational and investment, led to the emergence of a deficit in the government budget, As the global oil price crisis affected the revenues of the Iraqi government negatively, especially as this negative impact coincided with the increase in military spending resulting from Iraq's war against terrorism, Which led to the Iraqi government to implement austerity measures were to reduce public spending on several projects, which are less important compared to projects that a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Stances on the damage to manuscripts and ways to address them
...Show More Authors

Humans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.

View Publication Preview PDF
Publication Date
Wed Nov 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Replacing Formalin with Alcohol and its Effect on Preserved Fish Specimens
...Show More Authors
Abstract<p>This study aims to formulate an alternative solution for Formalin for preserving fish as study specimens for long periods. The main reason for finding a solution instead of formalin is to get rid of the negative effects of this solution on those who work with it, as well as to better preserve the bodies of fish. Hence, three new solutions were proposed to replace formalin. Thus, Formalin, in turn, may enter the composition of a small part of these solutions to give better results and for long periods of keeping specimens. All solutions prepared in this study participated in being acidic as in formalin. Two solutions succeeded in compensating for the use of formalin in preserving fish </p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jan 24 2019
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
On strongly E-convex sets and strongly E-convex cone sets
...Show More Authors

              -convex sets and -convex functions, which are considered as an important class of generalized convex sets and convex functions, have been introduced and studied by Youness [5] and other researchers. This class has recently extended, by Youness, to strongly -convex sets and strongly -convex functions. In these generalized classes, the definitions of the classical convex sets and convex functions are relaxed and introduced with respect to a mapping . In this paper, new properties of strongly -convex sets are presented. We define strongly -convex hull, strongly -convex cone, and strongly -convex cone hull and we proof some of their properties.  Some examples to illustrate the aforementioned concepts and to cl

... Show More
View Publication
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Energy management and storage systems on electric vehicles: A comprehensive review
...Show More Authors

View Publication
Scopus (52)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref