Preferred Language
Articles
/
jeasiq-1340
Using Multidimensional Contingency Coefficient to Discrimination Arabic Poems for Sample of Poets
...Show More Authors

The purpose of this paper to discriminate between the poetic poems of each poet depending on the characteristics and attribute of the Arabic letters. Four categories used for the Arabic letters, letters frequency have been included in a multidimensional contingency table and each dimension has two or more levels, then contingency coefficient calculated.

The paper sample consists of six poets from different historical ages, and each poet has five poems. The method was programmed using the MATLAB program, the efficiency of the proposed method is 53% for the whole sample, and between 90% and 95% for each poet's poems.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
ESTIMATED NON-PARAMETRIC AND SEMI-PARAMETRIC MODEL FOR LONGITUDINAL DATA
...Show More Authors

View Publication
Scopus
Publication Date
Sat Jan 01 2005
Journal Name
Iraqi Journal Of Science
Comparison between Zernike moment and central moments for matching problem
...Show More Authors

Moment invariants have wide applications in image recognition since they were proposed.

Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Engineering
Buckling Loads and Effective Length Factor for Non-Prismatic Columns
...Show More Authors

Publication Date
Sat Jun 01 2019
Journal Name
Al-nahrain Journal Of Science
THREE DIMENSIONAL EXPLICIT MODEL FOR COMETARY TAIL IONSINTERACTIONSWITH SOLAR WIND
...Show More Authors

The different interactions between cometary tail and solar wind ions are studied in the present paper based on three-dimensional Lax explicit method. The model used in this research is based on the continuity equations describing the cometary tail-solar wind interactions. Three dimensional system was considered in this paper. Simulation of the physical system was achieved using computer code written using Matlab 7.0. The parameters studied here assumed Halley comet type and include the particle density , the particles velocity v, the magnetic field strength B, dynamic pressure p and internal energy E. The results of the present research showed that the interaction near the cometary nucleus is mainly affected by the new ions added to the

... Show More
Publication Date
Sun Dec 18 2022
Journal Name
College Of Education For Women
Investigating Iraqi EFL Teachers Problems with English for Iraq Series
...Show More Authors

Iraqi EFL teachers face problems in teaching “English for Iraq Series” for primary public school pupils. In this paper, the researchers are going to identify the main problems faced by our teachers and try to find solutions to these problems. To achieve the aim of the study, list of questions asked and from teachers’ responses, the researchers have got an idea about the main problems which are related to textbook material, parents, learners, environment and technology. Therefore, the researchers adapted a questionnaire to achieve the purpose of the study with some changes and modifications. This questionnaire with five point scale (strongly agree, agree, undecided, disagree, strongly disagree). To achieve face validity, the

... Show More
Publication Date
Fri Nov 20 2020
Journal Name
Solid State Technology
Comparative Study for Bi-Clustering Algorithms: Historical and Methodological Notes
...Show More Authors

View Publication
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems
...Show More Authors

View Publication
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Thu Apr 26 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Normalization Bernstein Basis For Solving Fractional Fredholm-Integro Differential Equation
...Show More Authors

In this work, we employ a new normalization Bernstein basis for solving linear Freadholm of fractional integro-differential equations  nonhomogeneous  of the second type (LFFIDEs). We adopt Petrov-Galerkian method (PGM) to approximate solution of the (LFFIDEs) via normalization Bernstein basis that yields linear system. Some examples are given and their results are shown in tables and figures, the Petrov-Galerkian method (PGM) is very effective and convenient and overcome the difficulty of traditional methods. We solve this problem (LFFIDEs) by the assistance of Matlab10.   

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 26 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Minimax Shrunken Technique for Estimate Burr X Distribution Shape Parameter
...Show More Authors

      The present paper concern with minimax shrinkage estimator technique in order to estimate Burr X distribution shape parameter, when prior information about the real shape obtainable as original estimate while known scale parameter.

 Derivation for Bias Ratio, Mean squared error and the Relative Efficiency equations.

 Numerical results and conclusions for the expressions mentioned above were displayed. Comparisons for proposed estimator with most recent works were made.

 

View Publication Preview PDF
Crossref