Preferred Language
Articles
/
jeasiq-1341
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to include questions about population groups known to the number and other questions related to the target community, interviewed or interviewed by their parents at Ibn Rushd Hospital in Baghdad, with 104 persons for the period from April to June 2017.

In order to extract the indicators, we was used network's package in R. First, the estimation of the personal network size is estimated by relying on the number known of 20 groups. In the Recursive Back estimation of these groups, the groups whose estimation is very remote

 The real value and here will be used 3 methods for the purpose of deleting the groups with weak estimates, namely the method of (direct deletion , trimming and successive) method have been found that there are 8 groups were underestimated and this means will be based on 12 groups to estimate the number of users and the number of (33,183) people, including (6,636) persons under the age of 18 years.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Reflection of the application TD-ABC approach on profits persistence Applied study in the General State of Hydraulic Industries Factory of Plastic*
...Show More Authors

The interest of many companies has become dealing with the tools and methods that reduce the costs as one of the most important factors of successful companies, and became the subject of the attention of many economic units because of the impact on the profits of company, and since the nineties of the last century the researchers and writers gave great attention to this subject, especially in light of the large competition and rapid developments in cost management techniques, as well as the wide and significant change in production methods that have been directed towards achieving customer satisfaction, all this and more driven by economic units in all sectors whether it is service or productivity to find methods that would reduc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of the use of digital marketing channels on the implementation of the strategy of positioning Applied study on a sample of the managers of the International Company for smart card "Key Card"
...Show More Authors

 The technology in continuous and quick development, that reflects in all parts of our life and interred both scientific and practical fields. Marketing is one of them, a customer’s way to deal with choosing and demanding the product deferent from the traditional way. Some of the buying processes are electronic now, therefore the current research is identifying the digital channels that entered the world of marketing and influenced the activities and types that fall under this name and how it affects in positioning strategy, which is how to install the product or brand in the mind of the customer and was dimensions (brand identity, brand personality, brand communication, brand awareness, brand image), The researcher took t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
The construction of Complete (kn,n)-arcs in The Projective Plane PG(2,5) by Geometric Method, with the Related Blocking Sets and Projective Codes
...Show More Authors

A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
3rd International Scientific Conference Of Alkafeel University (iscku 2021)
Analysis of X-ray diffraction lines profile of Tio2 nanoparticles to determine the energy per unit volume and stress by using Halder-Wagner method
...Show More Authors

In this study, the Halder-Wagner method was used for an analysisX-ray lines of Tio2 nanoparticles. Where the software was used to calculate the FWHM and integral breath (β) to calculate the area under the curve for each of the lines of diffraction. After that, the general equation of the halder- Wagner method is applied to calculate the volume (D), strain (ε), stress (σ), and energy per unit(u). Volume (β). Where the value of the crystal volume was equal to (0.16149870 nm) and the strain was equal to (1.044126), stress (181.678 N / m2), and energy per unit volume (94.8474 J m-3).The results obtained from these methods were then compared with those obtained from each of the new paradigm of the HalderWagner method, the Shearer developm

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Sun Jan 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Test the effectiveness of Method EMDR
...Show More Authors

Our country faced lots of crises specially Wars and still living under the traumatic events. This would result in psychological disorder specially the Acute Stress Disorder (ASD). That’s if not treated, it will turn to be over Post Traumatic Stress Disorder(PTSD). Also not mentioning the shortage of recourses speaks about war and crises. That treat with its inflections psychologically and sociologically theses cases if happened.

The importance of this study arise through it is objective to introduce a program for EMDR which give benefit for treat in health, social, educational institutes.

Aims:

The objective of this Study is the identification of a Test the effectiveness of Eye Movement Desensi

... Show More
View Publication Preview PDF