Preferred Language
Articles
/
jeasiq-1341
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to include questions about population groups known to the number and other questions related to the target community, interviewed or interviewed by their parents at Ibn Rushd Hospital in Baghdad, with 104 persons for the period from April to June 2017.

In order to extract the indicators, we was used network's package in R. First, the estimation of the personal network size is estimated by relying on the number known of 20 groups. In the Recursive Back estimation of these groups, the groups whose estimation is very remote

 The real value and here will be used 3 methods for the purpose of deleting the groups with weak estimates, namely the method of (direct deletion , trimming and successive) method have been found that there are 8 groups were underestimated and this means will be based on 12 groups to estimate the number of users and the number of (33,183) people, including (6,636) persons under the age of 18 years.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Structural Equation Modeling for Tourist Attraction Factors in Asir Region by Using Factor Analysis in the Light of Vision of kingdom of Saudi Arabia (KSA) 2030
...Show More Authors

The research aimed to modeling a structural equation for tourist attraction factors in Asir Region. The research population is the people in the region, and a simple random sample of 332 individuals were selected. The factor analysis as a reliable statistical method in this phenomenon was used to modeling and testing the structural model of tourism, and analyzing the data by using SPSS and AMOS statistical computerized programs. The study reached a number of results, the most important of them are: the tourist attraction factors model consists of five factors which explain 69.3% of the total variance. These are: the provision of tourist services, social and historic factors, mountains, weather and natural parks. And the differenc

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Studying the Probability of Using Groundwater in Baghdad City for Human, Animal, and Irrigation Use
...Show More Authors

Groundwater is an important source of fresh water especially in countries having a decrease in or no surface water; therefore itis essential to assess the quality of groundwater and find the possibility of its use in different purposes (domestic; agricultural; animal; and other purposes). In this paper samples from 66 wells lying in different places in Baghdad city were used to determine 13 water parameters, to find the quality of groundwater and evaluate the possibility of using it for human, animal and irrigation by calculating WQI, SAR, RSC and Na% and TDS indicators. WQI results showed that the groundwater in all wells are not qualified for human use, while SAR and RSC indicated that most samples are suitable for irrigation use, and

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Electronic University Library: Reality and Ambition Case Study Central Library of Baghdad University
...Show More Authors

Electronic University Library: Reality and Ambition Case Study Central Library of Baghdad University

View Publication Preview PDF
Publication Date
Sun Jun 30 2019
Journal Name
Journal Of The College Of Education For Women
Ready-made clothes for students of the University of Baghdad between reality and ambition ( A field study )
...Show More Authors

     تعد الملابس وسيلة هامة لكل مايقوم به الانسان في حياته العامة ، فهي الانطباع والكلمة الخارجية عن ذاته الداخلية فهي تعكس فكرة الفرد عن ذاته وعن شخصيته , كما تعد وسيلة تعبير جمالية وفنية , فهي تساعد على اخفاء عيوب الجسد وابراز محاسنه . ويتوقف اختيار الفرد لملابسه على مجموعة  عوامل منها احتياجه , قدراته المالية , سنه , مركزه الاجتماعي , طبيعة عمله ,الظروف الجوية التي يعيش فيها وعلى مايُؤمن به من قيم و

... Show More
View Publication
Publication Date
Fri Apr 21 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees22fr
Study of the x-ray diffraction lines of calcium titanate nanoparticle using SSP method and Scherrer method
...Show More Authors

In this study, the modified size-strain plot (SSP) method was used to analyze the x-ray diffraction lines pattern of diffraction lines (1 0 1), (1 2 1), (2 0 2), (0 4 2), (2 4 2) for the calcium titanate(CaTiO3) nanoparticles, and to calculate lattice strain, crystallite size, stress, and energy density, using three models: uniform (USDM). With a lattice strain of (2.147201889), a stress of (0.267452615X10), and an energy density of (2.900651X10-3 KJ/m3), the crystallite was 32.29477611 nm in size, and to calculate lattice strain of Scherrer (4.1644598X10−3), and (1.509066023X10−6 KJ/m3), a stress of(6.403949183X10−4MPa) and (26.019894 nm).

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (9)
Scopus Crossref
Publication Date
Mon Apr 02 2012
Journal Name
Eastern Mediterranean Health Journal
Knowledge, attitude and practice regarding breast cancer and breast self-examination among a sample of the educated population in Iraq
...Show More Authors

This cross-sectional, questionnaire-based study evaluated the knowledge, attitude and practice towards breast cancer and breast self-examination [‎BSE]‎ among 387 [‎302 females and 85 males]‎ educated Iraqis affiliated to 2 Iraqi universities. The participants were categorized into 3 occupations: student [‎71.3%]‎, teaching staff [‎10.3%]‎ and administrative staff [‎18.3%]‎. About half of the participants had a low knowledge score [‎< 50%]‎; only 14.3% were graded as [‎Good]‎ and above. Almost 75% of the participants believed that the best way to control breast cancer was through early detection and other possible preventive measures. Most participants [‎90.9%]‎ had heard of BSE, the main source of informatio

... Show More
View Publication Preview PDF
Scopus (38)
Crossref (38)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Plant Archives J.
Evaluation of the performance of triple, single crosses and their inbred in bred lines of maize under two plant population
...Show More Authors

Scopus (2)
Scopus