Preferred Language
Articles
/
jeasiq-1341
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to include questions about population groups known to the number and other questions related to the target community, interviewed or interviewed by their parents at Ibn Rushd Hospital in Baghdad, with 104 persons for the period from April to June 2017.

In order to extract the indicators, we was used network's package in R. First, the estimation of the personal network size is estimated by relying on the number known of 20 groups. In the Recursive Back estimation of these groups, the groups whose estimation is very remote

 The real value and here will be used 3 methods for the purpose of deleting the groups with weak estimates, namely the method of (direct deletion , trimming and successive) method have been found that there are 8 groups were underestimated and this means will be based on 12 groups to estimate the number of users and the number of (33,183) people, including (6,636) persons under the age of 18 years.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Validity of Generalized Standard Addition Method for a Mixture of Amino Acid Analysis
...Show More Authors

A Modified version of the Generlized standard addition method ( GSAM) was developed. This modified version was used for the quantitative determination of arginine   (Arg) and glycine ( Gly) in arginine  acetyl salicylate – glycine complex . According to this method two linear equations were solved to obtain the amounts of (Arg) and (Gly). The first equation was obtained by spectrophotometic measurement of the total absorbance of (Arg) and (Gly) colored complex with ninhydrin . The second equation was obtained by measuring the total acid consumed by total amino groups of (Arg) and ( Gly). The titration was carried out in non- aqueous media using perchloric acid in glacial acetic acid as a titrant. The developed metho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Journal Of Applied Spectroscopy
Spectrophotometric Method for Determination of Cu(II) Using a New Schiff Base Ligand
...Show More Authors

The Cu(II) was found using a quick and uncomplicated procedure that involved reacting it with a freshly synthesized ligand to create an orange complex that had an absorbance peak of 481.5 nm in an acidic solution. The best conditions for the formation of the complex were studied from the concentration of the ligand, medium, the eff ect of the addition sequence, the eff ect of temperature, and the time of complex formation. The results obtained are scatter plot extending from 0.1–9 ppm and a linear range from 0.1–7 ppm. Relative standard deviation (RSD%) for n = 8 is less than 0.5, recovery % (R%) within acceptable values, correlation coeffi cient (r) equal 0.9986, coeffi cient of determination (r2) equal to 0.9973, and percentage capita

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Numerical Analysis of Least-Squares Group Finite Element Method for Coupled Burgers' Problem
...Show More Authors

In this paper, a least squares group finite element method for solving coupled Burgers' problem in   2-D is presented. A fully discrete formulation of least squares finite element method is analyzed, the backward-Euler scheme for the time variable is considered, the discretization with respect to space variable is applied as biquadratic quadrangular elements with nine nodes for each element. The continuity, ellipticity, stability condition and error estimate of least squares group finite element method are proved.  The theoretical results  show that the error estimate of this method is . The numerical results are compared with the exact solution and other available literature when the convection-dominated case to illustrate the effic

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
3rd International Conference On Smart Cities And Sustainable Planning
Towards sustainable tourism: EIA of natural environment in Sawa lake using RIAM method
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
The Galerkin-Implicit Method for Solving Nonlinear Variable Coefficients Hyperbolic Boundary Value Problem
...Show More Authors

This paper has the interest of finding the approximate solution (APPS) of a nonlinear variable coefficients hyperbolic boundary value problem (NOLVCHBVP).  The given boundary value problem is written in its discrete weak form (WEFM) and proved  have a unique solution, which is obtained via the mixed Galerkin finite element with implicit method that reduces the problem to solve the Galerkin nonlinear algebraic system  (GNAS). In this part, the predictor and the corrector techniques (PT and CT, respectively) are proved at first convergence and then are used to transform  the obtained GNAS to a linear GLAS . Then the GLAS is solved using the Cholesky method (ChMe). The stability and the convergence of the method are stud

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Feb 06 2025
Journal Name
Al–bahith Al–a'alami
Persuasive Sentimental Method in the Electronic Newspapers of Terrorist Organizations - A research drawn from a Master Degree thesis
...Show More Authors

The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)

... Show More
View Publication Preview PDF
Crossref (1)
Crossref