Preferred Language
Articles
/
jeasiq-1381
أسلوب بيز في تحليل البيانات غير التامة
...Show More Authors

In this paper we will explain ,how use Bayesian procedure in analysis multiple linear regression model with missing data in variables X's  as the new method suggest , and explain some of missing  Patterns under missing mechanism , missing complete at random MCAR and compare Bayesian estimator with complete case estimator by use  simulation procedure .           

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Eatimation Availability Function Through Determination The Optimal Imperfect Preventive Maintenance Period By using Simulation
...Show More Authors

This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.

According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability

p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive

preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the

average durations of the preventive and corrective maintenance actions a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 10 2020
Journal Name
Journal Of Arts, Literature, Humanities And Social Sciences
Análisis de los textos deportivos españoles y su traducción al تحليل النصوص الرياضية الاسبانية و ترجمتها الى العربية
...Show More Authors

View Publication
Publication Date
Mon Dec 16 2024
Journal Name
مجلة( النشرة الدولية في علم اللغة التطبيقي) Sabir. International Bulletin Of Applied Linguistics
فاعلية تطبيق أسلوب المهام الدراسية في اتقان اللغة الاسبانية للطلبة العراقيين
...Show More Authors

فاعلية تطبيق اسلوب المهام الدراسية في اتقان اللغة الاسبانية للطلبة العراقيين.

Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
تأثير الذكاء الشعوري في الذكاء المنظمي دراسة تطبيقيه في الشركة العامة للصناعات الكهربائية
...Show More Authors

The two terms"of fective intelligece and organizational intelligence" is it is the emotional intelligency and organizational intelligency"are considered as one of the contemporany terms which the various organizations started to function them in their activities to in crease their efficiency.

This study aims at examining those two terms and the possibility of their functioning them in one of the general organizations and the questionnaire is used as atool to gather information that are distributed on asample consists of (50)employees and selected randomly from various organizationl levels.

The most important conclusions:<

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
ابعاد الجودة في السيطرة على العدوى المكتسبة في المستشفيات الحكومية العراقية: دراسة تقويمية
...Show More Authors

ابعاد الجودة في السيطرة على العدوى المكتسبة في المستشفيات الحكومية العراقية: دراسة تقويمية

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
Solzhenitsyn's Style of Artistic Research: Опыт стиля художественного исследования А.Солженицыным
...Show More Authors

 Aleksandr Isayevich Solzhenitsyn was born in 1918 in Kislovodsk. His father was educated, and despite his peasantry origin, he got a university degree. Unfortunately, however, Solzhenitsyn could not recognize his father, for he died before his birth.

Solzhenitsyn was accused of being an opponent to the Soviet Union due to his activities of that time. He was exiled to a forced labour camp for eight years, on the surroundings of Moscow. He spent three years in Kazakhstan, and was sent to the life exile. He was set free in 1956. He worked as a teacher in in rural schools in Vladimir and then in Rezhran. 

His greatest works were in the reign of Kherchov, and in 1962 appeared his story under the title of "One day in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
أسلوب معاملة البنات (الإحسان – الجحود) للوالدین وعلاقتھ باستقرارھن النفسي
...Show More Authors

Target current research to identify the style (charity - ingratitude) in the
treatment of parents and to identify the psychological stability as well as to identify
the correlation between two variables, And identifies current research by students
fourth grade - and the first phase of study of students in the College of Education
for Girls in the morning preliminary study for the academic year (2009-2010) m
Total numbers (400) students. After the application of research tools and data
processing means of appropriate statistical research concluded that the handling of
students with parents, a charity And treatment of students to mothers were treated
to the best of fathers as well as the enjoyment of a high level of

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Proposed Entropy Loss function and application to find Bayesian estimator for Exponential distribution parameter
...Show More Authors

The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial

... Show More
View Publication Preview PDF
Crossref