Preferred Language
Articles
/
jeasiq-1312
symmetric analysis of multiple variables classified ranked orthogonal polynomials
...Show More Authors

MCA has gained a reputation for being a very useful statistical method for determining the association between two or more categorical variables and their graphical description. For performance this method, we must calculate the singular vectors through (SVD). Which is an important primary tool that allows user to construct a low-dimensional space to describe the association between the variables categories. As an alternative procedure to use (SVD), we can use the (BMD) method, which involves using orthogonal polynomials to reflect the structure of ordered categorical responses. When the features of BMD are combined with SVD, the (HD) is formed. The aim of study is to use alternative method of (MCA) that is appropriate with ordered categorical data, this method is known as (HD). When compared the results of (HD) with (MCA), the (HD), will give the same representation, and we get a clear association interpretation among the categories in terms of linear, quadratic and higher order components for variables, also graphical display of the individual units will show an automatic clustering.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Numerical Investigation, Error Analysis and Application of Joint Quadrature Scheme in Physical Sciences
...Show More Authors

In this work, a joint quadrature for numerical solution of the double integral is presented. This method is based on combining two rules of the same precision level to form a higher level of precision. Numerical results of the present method with a lower level of precision are presented and compared with those performed by the existing high-precision Gauss-Legendre five-point rule in two variables, which has the same functional evaluation. The efficiency of the proposed method is justified with numerical examples. From an application point of view, the determination of the center of gravity is a special consideration for the present scheme. Convergence analysis is demonstrated to validate the current method.

View Publication Preview PDF
Scopus (16)
Crossref (1)
Scopus Crossref
Publication Date
Sun Oct 31 2021
Journal Name
Archives Of Razi Institute
Molecular Analysis of fimA Operon Genes among UPEC Local Isolates in Baghdad City
...Show More Authors

Specialized Escherichia coli (E. coli) isolates, called uropathogenic E. coli (UPEC), cause most of urinary tract infections (UITs). Once bacteria reached the urinary tract of the host, they have to adhere to the host cell for the colonization. For this purpose, bacteria have different structures including fimbrial adhesins. Most of the UPECs contain type 1 fimbriae encoded by fim operon (fimB, E, A, I, C, D, F, G, H) which is responsible for the adhesive ability in these isolates. Ninety-four isolates of UPEC were obtained from UTI patients in Baghdad hospitals and their diagnosis were confirmed by the PCR method using 16srDNA as a housekeeping gene. The UPEC isolates were tested for their ability of adherence to the urothelial cells obtai

... Show More
View Publication Preview PDF
Scopus (3)
Scopus
Publication Date
Sat Jan 01 2022
Journal Name
Structural Durability & Health Monitoring
Seismic Analysis of Reinforced Concrete Silos under Far-Field and Near-Fault Earthquakes
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Performance Analysis of Four Conceptual Designs for the Air Based Photovoltaic / Thermal Collectors
...Show More Authors

The  thermal  and  electrical  performance  of  different  designs  of  air  based  hybrid photovoltaic/thermal collectors is investigated experimentally and theoretically. The circulating air is used to cool PV panels and to collect the absorbed energy to improve their performance. Four different collectors have been designed, manufactured and instrumented namely; double PV panels without cooling (model I), single duct double pass collector (model II), double duct single pass (model III), and single duct single pass (model IV) . Each collector consists of: channel duct, glass cover, axial fan to circulate air and two PV panel in parallel connection. The temperature of the upper and

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 29 2024
Journal Name
مجلة العلوم التربوية والنفسية
Needs in the stories of the Brothers Grimm (a study in content analysis)
...Show More Authors

The current study aims to identify the needs in the stories of the Brothers Grimm. The research sample consisted of (3) stories, namely: 1- The story of the Thorn Rose (Sleeping Beauty) 2- The story of Snow White 3- The story of Little Red Riding Hood. The number of pages analyzed reached (15.5) pages, and to achieve the research objectives, Murray's classification of needs was adopted, which contains (36) basic needs that are further divided into (129) sub-needs. The idea was adopted as a unit of analysis and repetition as a unit of enumeration, Reliability was extracted in two ways: 1- Agreement between the researcher and himself over time, where the agreement coefficient reached 97%. The second was agreement between the researcher and tw

... Show More
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Spatial and Temporal Analysis of Severe Dust Storm in Iraq in May 2022
...Show More Authors

Dust storms are a common ecological occurrence in many world‘s countries, mainly in dry and semi-dry parts. Dust storms tremendously influence human health, the environment, the climate, and numerous social aspects. In this paper, spatial and temporal analysis, metrological triggers, and trajectory, dust exporting areas of a severe dust storm that occurred in Iraq on May 16, 2022, were investigated. The dust storm's backward trajectory was determined using HYSPLIT model, which is then compared with MODIS and Meteosat satellite images. The weather is then analyzed using the NCEP/NCAR Reanalysis model, and the approximate area of these sources was determined using Landsat 8 satellite image classification method. The results revealed

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Modeling and analysis of thermal contrast based on LST algorithm for Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Aip Conference Proceedings
COMPARATIVE ANALYSIS OF IMMUNE CELLS ACTIVATION AND CYTOTOXICITY UPON EXPOSURE PATHOGEN AND GLYCOCONJUGATES
...Show More Authors

View Publication
Scopus Clarivate Crossref