Preferred Language
Articles
/
jeasiq-1409
مقارنة طرائق تقدير معلمات توزيع كاما ذي المعلمتين في حالة البيانات المفقودة باستخدام المحاكاة
...Show More Authors

The estimation of the parameters of Two Parameters Gamma Distribution in case of missing data has been made by using two important methods: the Maximum Likelihood Method and the Shrinkage Method. The former one consists of three methods to solve the MLE non-linear equation by which the estimators of the maximum likelihood can be obtained: Newton-Raphson, Thom and Sinha methods. Thom and Sinha methods are developed by the researcher to be suitable in case of missing data. Furthermore, the Bowman, Shenton and Lam Method, which depends on the Three Parameters Gamma Distribution to get the maximum likelihood estimators, has been developed. A comparison has been made between the methods in the experimental aspect to find the best method through simulation by using the Monte Carlo Method. Several experimentations have been made by using the important statistical measure: Mean Square Error (MSE).

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Comparison between Modified Weighted Pareto Distribution and Many other Distributions
...Show More Authors

 

In 2020 one of the researchers in this paper, in his first research, tried to find out the Modified Weighted Pareto Distribution of Type I by using the Azzalini method for weighted distributions, which contain three parameters, two of them for scale while the third for shape.This research compared the distribution with two other distributions from the same family; the Standard Pareto Distribution of Type I and the Generalized Pareto Distribution by using the Maximum likelihood estimator which was derived by the researchers for Modified Weighted Pareto Distribution of Type I, then the Mont Carlo method was used–that is one of the simulation manners for generating random samples data in different sizes ( n= 10,30,50), and in di

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the method of partial least squares and the algorithm of singular values decomposion to estimate the parameters of the logistic regression model in the case of the problem of linear multiplicity by using the simulation
...Show More Authors

The logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables.                                                        The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.    

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Nov 22 2018
Journal Name
Baghdad University
صيغ الافعال في النصوص المسماريةالمنشورة وغير المنشورةمن مدينة سبار(2004-1595ق.م) دراسة مقارنة مع اللغة العربية
...Show More Authors

The study of cuneiform texts is very important for finding out the ancient history of Iraq and its civilization, as well as the close relation among languages, especially Semitic, the mother language to which both Akkadian and Arabic belong, the matter that clarifies the linkage among them. The Akkadian language is among these Jazri (a Semitic branch) languages, besides Arabic. It is the most ancient one. It consisted of a lot of genuine linguistic rules derived from the mother Jazri language. Contrastive Akkadian studies approved these linguistic rules. Due to the close linkage that relates Akkadian language to its sister Arabic , as they both relate to the same family, the researcher an verbs and compared them with studied aspects and moo

... Show More
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Comparison Between Two Shape Parameters Estimators for (Burr-XII) Distribution
...Show More Authors

This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider  because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parame

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
إعداد خطة قبول خمسية للطلبة في كلية الإدارة والاقتصاد/ جامعة بغداد باستخدام منهجية (بوكس – جينكنز) لتحليل السلاسل الزمنية
...Show More Authors

المستخلص:

 إن من أهم عوامل نجاح أي مؤسسة (سواء كانت مؤسسة تعليمية أم غيرها من المؤسسات) هو التخطيط الاستراتيجي السليم المبني على أساس علمي ونظام واقعي متكامل بعيداً عن التخمين والحدس.

تتمثل مشكلة البحث بوجود تفاوت بين أعداد الطلبة المقبولين فعلاً والطلبة المخطط قبولهم في الدراسات الأولية بكلية الإدارة والاقتصاد بجامعة بغداد في كل عام دراسي حيث غالباً كانت أعداد الطلبة المقبولين فعل

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Estimating Lipoxygenase and Gamma-glutamyl Transferase Activities in Sera of Colon Cancer Patients with Partial Purification of Lipoxygenase
...Show More Authors

            Colon cancer is an abnormal growth of cells that occurs in the large intestine. Sometimes growth remains restricted for a relatively long time before it becomes a malignant tumor and then spreads through the intestinal wall to the lymph nodes and other parts of the body. The study aims to estimate the effectiveness and partial purification of lipoxygenase (LOX) enzyme and measure gamma-glutamyle transferase (GGT) activity in serum patients of colon cancer in Baghdad. The study included (80) case male patients with colon cancer with (50) samples of apparently healthy males (control) as comparison group. The result displayed a noteworthy increase in lipoxygenase effectivene

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة بعض معايير تحديد الرتبة لانموذج الانحدار الذاتي (الطبيعي وغير الطبيعي) من الرتبة الاولـى بأستخدام المحاكـاة
...Show More Authors

The search is contain compared among some order selection criteria  (FPE,AIC,SBC,H-Q) for the Model first order  Autoregressive when the White Noise is follow Normal distribution and some of non Gaussian distributions (Log normal, Exponential and Poisson distribution ) by using Simulation  

 

View Publication Preview PDF
Crossref