Preferred Language
Articles
/
jeasiq-121
Comparison Some Estimation Methods Of GM(1,1) Model With Missing Data and Practical Application
...Show More Authors

This paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt  properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1)  is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method  (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to make sure the accuracy of grey model GM(1,1). The most important results we have reached  (LS) is the best method to estimate the parameters of this model, as when applied proved to obtaining the best results and used this method in the process of addressing one of the problems of this data and missing values, and also used in the forecasting process for   future values.

                                               

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
ESTIMATION OF THE OPTIMUM BED THICKNESS OF A FLOWTHROUGH POROUS ELECTRODE (FTPE) WORKING UNDER MASS TRANSFER CONTROL
...Show More Authors

In this paper, a theoretical analysis of optimum bed thickness operates under mass transfer control for realizing a high efficiency and reaction conversion of an electrochemical reactor has been made based on flowthrough porous electrode (FTPE) configuration. Many models have been used to represent the optimum bed thickness by taking a look into previous works concerned and collecting all related information, data, and models. The parameters that affect the optimum bed thickness have been visualized and reviewed, and almost all of them have been examined by experimental data from different sources and based on the various models. It has been found that the increase in electrolyte flow rate, concentration, limiting current density, and sp

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
DYNAMIC MODELING OF TIME-VARYING ESTIMATION FOR DISCRETE SURVIVAL ANALYSIS FOR DIALYSIS PATIENTS IN BASRAH, IRAQ
...Show More Authors

Survival analysis is widely applied to data that described by the length of time until the occurrence of an event under interest such as death or other important events. The purpose of this paper is to use the dynamic methodology which provides a flexible method, especially in the analysis of discrete survival time, to estimate the effect of covariate variables through time in the survival analysis on dialysis patients with kidney failure until death occurs. Where the estimations process is completely based on the Bayes approach by using two estimation methods: the maximum A Posterior (MAP) involved with Iteratively Weighted Kalman Filter Smoothing (IWKFS) and in combination with the Expectation Maximization (EM) algorithm. While the other

... Show More
View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of Educational And Psychological Researches
The impact of the proposed strategy in accordance with the objectives of science in achievement and some science operations at the second-grade middle students in chemistry
...Show More Authors

It aim current researchs֬ to identify the impact of a proposed strategy in accordance with the objectives of science in the achievement and some science processes, where the experimental method was adopted, and define the research community was students second grade averag in Education Bagdad / Rusafa third, research sample intentionally chosen as school Radwan, and (30) students experimental group and (29) of control group, research tools were achievement test and the test of science operations and use the appropriate statistical tools to process information and data, showing results, the experimental group surpassed the control group in the collection and operations science, and light it, the researcher recommended several recommendat

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
J. Of University Of Anbar For Pure Science
Synthesis, spectral Characterization and studies of Some Divalent Metal Ion Complexes with Ligand of [3-(1H-indol- 3-yl)-2-(3-(4-methoxybenzoyl)thiouereido)propanoic acid] (MTP
...Show More Authors

In this work, prepared new ligand[3- (1H-indol-3-yl) -2- (3-(4- methoxybenzoyl)thiouereido) propanoic acid](MTP) has been synthesized by reaction of 4-Methoxybenzoyl isothiocyanate with tryptophane(1:1), The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13C NMR spectra, Some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MTP)2] (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg), the proposed geometrical structure for all complexes were tetrahedral except copper complex has a square planer geometry around metallic ion

... Show More
Publication Date
Mon Jan 23 2023
Journal Name
Journal Of Cellular And Molecular Medicine
The efficacy of non‐surgical platelet‐rich fibrin application on clinical periodontal parameters and periostin level in periodontitis: Clinical trial
...Show More Authors
Abstract<p>Platelet‐rich fibrin (PRF) has been widely used in regenerative dentistry due to many growth factors produced. Periostin, a matricellular protein, is a reliable marker for tissue regeneration. Periostin is part of the cellular matrix and regulates bone homeostasis. This study aims to explore the efficacy of PRF in improvement of the clinical periodontal parameters as an adjunct to the scaling and root planing and to evaluate periostin level in gingival crevicular fluid (GCF) at baseline, 1‐ and 3‐month recall visits. Fourteen periodontitis patients who met the inclusion criteria were recruited in this study. Two contralateral periodontal pockets with 4–6 mm in depth in each patient were sel</p> ... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
African Journal Of Hospitality, Tourism And Leisure
Effect of Employees' Abilities on Successful ICT Application and Sustainable Development Goals: a Descriptive Study in hospitality Organizations in Iraq
...Show More Authors

The aim of this study is to evaluate the implementation of ICT applications in public service organizations, which is responsible for the implementation of public policy. The study examined the success of ICT in achieving its goals by meeting the main needs of the community members which is the first requirement in the success of sustainable development plans before determine the capabilities of ICT. The main pillar of success in the implementation of ICT systems is the key to improving the efficiency of the organization's performance. This is a reflection of the effectiveness and quality of the services provided to its beneficiaries. The study concluded that the current level of capabilities of individuals working in public organizations i

... Show More
View Publication Preview PDF
Scopus (1)
Scopus
Publication Date
Sat Feb 02 2019
Journal Name
Journal Of The College Of Education For Women
The Balance and unbalance in alliance relations The Saudi Arabia and United State Relation as model: The Balance and unbalance in alliance relations The Saudi Arabia and United State Relation as model
...Show More Authors

Abstract:
Saudi Arabia and United States long relation could present an important
subject to understand alliance kind in international relations types. We trying
in this study to diagnose and analyze the Saudi Arabia and United States
model to find balance and unbalance statues and its influence on the
directions of Saudi Arabia foreign policy positions.
We divided the study in two parts, each part have many sections. The
first part deal with the historian emergence of Saudi Arabia state and its
development in three stages including its foreign relations with regions and
international powers. While the second part was dedicated in analyzing and
understanding the mechanism and active facts that drawing the Sa

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Cluster Analysis by Using Nonparametric Cubic B-Spline Modeling for Longitudinal Data
...Show More Authors

Longitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.

In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.

The longitudinal balanced data profile was compiled into subgroup

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More