Preferred Language
Articles
/
jeasiq-121
Comparison Some Estimation Methods Of GM(1,1) Model With Missing Data and Practical Application
...Show More Authors

This paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt  properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1)  is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method  (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to make sure the accuracy of grey model GM(1,1). The most important results we have reached  (LS) is the best method to estimate the parameters of this model, as when applied proved to obtaining the best results and used this method in the process of addressing one of the problems of this data and missing values, and also used in the forecasting process for   future values.

                                               

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 24 2024
Journal Name
Journal Of Studies And Researches Of Sport Education
The effect of the use of the Colb model according to the two forms (adaptive, ascending) in learning some of the technical skills of women
...Show More Authors

The objective of the study was to identify the effect of the use of the Colb model for the students of the third stage in the College of Physical Education and Sports Sciences, University of Baghdad,As well as to identify the differences between the research groups in the remote tests in learning skills using the model Colb.The researcher used the experimental method and included the sample of the research on the students of the third stage in the College of Physical Education and Sports Science / University of Baghdad by drawing lots, the third division (j) was chosen to represent the experimental group,And the third division (c) to represent the control groupafter the distribution of the sample splitting measure according to the Colb mode

... Show More
Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
Inverting Gravity Data to Density and Velocity Models for Selected Area in Southwestern Iraq
...Show More Authors

The gravity method is a measurement of relatively noticeable variations in the Earth’s gravitational field caused by lateral variations in rock's density. In the current research, a new technique is applied on the previous Bouguer map of gravity surveys (conducted from 1940–1950) of the last century, by selecting certain areas in the South-Western desert of Iraqi-territory within the provinces' administrative boundary of Najaf and Anbar. Depending on the theory of gravity inversion where gravity values could be reflected to density-contrast variations with the depths; so, gravity data inversion can be utilized to calculate the models of density and velocity from four selected depth-slices 9.63 Km, 1.1 Km, 0.682 Km and 0.407 Km.

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Synthesis, characterization and spectroscopic studies on Schiff base complexes of 1-phenyl-2, 3-dimethyl-4-amino-5-oxo-pyrazole with salicylaldehyde with some divalent transition metals
...Show More Authors

In this research, the preparation of bidentate Schiff base was carried out via the condensation reaction of both the salicylaldehyde with 1-phenyl-2,3-dimethyl-4-amino-5-oxo-pyrazole to form the ligand (L). The mentioned ligand was used to prepare complexes with transition metal ions Mn(II), Co(II), Ni(II), Cu(II) and Zn(II). The resulting complexes were separated and characterized by FTIR and UV-Vis spectroscopic technique. Elemental analysis for Carbon, Hydrogen and Nitrogen elements, electronic spectra of the ligand and complexes were obtained, and the magnetic susceptibility tests were also achieved to measure the dipole moments. The molar conductivities were also measured and determination of chlorine content in the complexes and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 10 2017
Journal Name
Journal Of The College Of Basic Education
Detection of some major elements and protein in Fusarium wilt disease infected tomato(Lycopersicon esculentum) treated with Arbuscular mycorrhizal fung
...Show More Authors

The present study was Conducted to evaluate the effect of amixture of three species of arbuscular mycorrhizal fungi ( Glomus etunicatum , G. leptotichum and Rhizophagus intraradices ) in Influence on the percentage of the components of NPK and protein of tomato leaves and roots infected with Fusarium oxysporum f.sp. Lycopersici wich cause Fusarial wilt disease , planted for 8 weeks in the presence of the organic matter ( peatmose) , using pot cultures in aplastic green house , Results indicated significant increase in the percentage of the elements of NK and protein of tomato leaves and roots In the control treatment (C), While the percentage of the element P was after infection with the pathogen 4 weaks after mycorrhizal colonization in al

... Show More
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Theoretical Study of 4-(2-methyl-4-oxoquinazoline-3(4H)-yl) Benzoic acid with Some Transition Metal Ions
...Show More Authors

New complexes of the type [ML2(H2O)2] ,[FeL2(H2O)Cl] and [VOL2] were M=Co(II),Ni(II) and Cu(II) ,L=4-(2-methyl-4-oxoquinazoline-3(4H)-yl) benzoic acid were synthesized and characterized by element analysis, magnetic susceptibility ,molar conductance ,FT-IR and UV-visible. The studies indicate that the L acts as doubly monodentate bridge for metal ions and form mononuclear complexes. The complexes are found to be octahedral except V(IV) complex is square pyrimde shape . The structural geometries of compounds were also suggested in gas phase by theoretical treatments, using Hyper chem-6 program for the molecular mechanics and semi-empirical calculations, addition heat of formation(?Hf ?) and binding energy (?Eb)for the free ligan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 10 2017
Journal Name
مجلة كلية التربية الاساسية/الجامعة المستنصرية
Detection of some major elements and protein in Fusarium wilt disease infected tomato(Lycopersicon esculentum) treated with Arbuscular mycorrhizal fungi
...Show More Authors

Abstract The present study was Conducted to evaluate the effect of amixture of three species of arbuscular mycorrhizal fungi ( Glomus etunicatum , G. leptotichum and Rhizophagus intraradices ) in Influence on the percentage of the components of NPK and protein of tomato leaves and roots infected with Fusarium oxysporum f.sp. Lycopersici wich cause Fusarial wilt disease , planted for 8 weeks in the presence of the organic matter ( peatmose) , using pot cultures in aplastic green house , Results indicated significant increase in the percentage of the elements of NK and protein of tomato leaves and roots In the control treatment (C), While the percentage of the element P was after infection with the pathogen 4 weaks after mycorrhiza

... Show More