Preferred Language
Articles
/
jeasiq-154
Comparison of Slice inverse regression with the principal components in reducing high-dimensions data by using simulation
...Show More Authors

This research aims to study the methods of reduction of dimensions that overcome the problem curse of dimensionality when traditional methods fail to provide a good estimation of the parameters So this problem must be dealt with directly . Two methods were used to solve the problem of high dimensional data, The first method is the non-classical method Slice inverse regression ( SIR ) method and the proposed weight standard Sir (WSIR) method and principal components (PCA) which is the general method used in reducing dimensions,    (SIR ) and (PCA) is based on the work of linear combinations of a subset of the original explanatory variables, which may suffer from the problem of heterogeneity and the problem of linear multiplicity between most explanatory variables. These new combinations of linear compounds resulting from the two methods will reduce the number of explanatory variables to reach a new dimension one or more which called the effective dimension. The mean root of the error squares will be used to compare the two methods to show the preference of methods and a simulation study was conducted to compare the methods used. Simulation results showed that the proposed weight standard Sir method is the best.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 30 2017
Journal Name
Journal Of Engineering
Performance Evaluation of a PID and a Fuzzy PID Controllers Designed for Controlling a Simulated Quadcopter Rotational Dynamics Model
...Show More Authors

This work is concerned with designing two types of controllers, a PID and a Fuzzy PID, to be used
for flying and stabilizing a quadcopter. The designed controllers have been tuned, tested, and
compared using two performance indices which are the Integral Square Error (ISE) and the Integral
Absolute Error (IAE), and also some response characteristics like the rise time, overshoot, settling
time, and the steady state error. To try and test the controllers, a quadcopter mathematical model has
been developed. The model concentrated on the rotational dynamics of the quadcopter, i.e. the roll,
pitch, and yaw variables. The work has been simulated with “MATLAB”. To make testing the
simulated model and the controllers m

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 10 2017
Journal Name
Superconductor Science And Technology
Conceptual designs of conduction cooled MgB<sub>2</sub> magnets for 1.5 and 3.0 T full body MRI systems
...Show More Authors

View Publication
Scopus (61)
Crossref (58)
Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Investigation of Beta and Gamma Rays Total Interaction Cross Section and Effective Atomic Number for CR-39Nuclear Track Detector
...Show More Authors

CR-39 is a solid state nuclear track detector (SSNTD) that has been used in many research areas. In spite of the assumption that the CR-39 detectors are insensitive to beta and gamma rays, irradiation with these rays can have significant effects on the detector properties. In this study, beta and gamma rays mass attenuation coefficients μ/ρ (cm2 g-1) for the CR-39 detector have been measured using NaI(Tl) scintillation spectrometer along with a standard geometrical arrangement in the energy region of (0.546-2.274) MeV beta rays and standard gamma sources having energy 0.356, 0.5697, 0.6617 and 1.063 MeV. The total atomic cross-section (σtot), total electronic cross-section (σT E) and the effective atomic number (Zeff) of gamma rays a

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2017
Journal Name
Energy Procedia
Preparation and Physical Properties of Doped CdBa 2-x Sr x Ca 2 Cu 3 O 8+δ Compound
...Show More Authors

View Publication
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Jul 15 2021
Journal Name
University Of Samarra
Preparation, Diagnosis and Biological ‎Efficacy of new Ligands Derived from ‎Succinyl Chloride and Their Metal ‎Complexes and non metallic
...Show More Authors

The purpose of my thesis is to synthesis two new bidentate ligands ‎which were used to prepare series of metal complexes by reacting the ‎ligands with (M+2 = Mn, Co, Ni, Cu, Cd and Hg) ‎ ‎ Succinyl chloride was used as starting material to synthesis two ‎bidentate ligands (L1) and (L2) by reaction it with 4-chloroaniline ‎‎(L1) and ‎ ‎ (4-aminoacetophenone) (L2) in dichloromethane as a solvent, that ‎are:‎ ‎(L1) = N1,N4-bis (4-chloro phenyl ) succinamide ‎(L2) =N1,N4-bis(4-acetylphenyl)succinamide ‎ The new ligands were characterize by using spectroscopic study ‎‎(Fourier-transform infrared spectroscopy (FT-IR), electronic spectra ( ‎UV-Vis) ,nuclear magnetic resonance(1H,13C-NMR), Mass spectra ‎

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Preparation and characterization of biomass-alumina composite as adsorbent for safranine-o dye from aqueous solution at different temperatures
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Fri Jul 12 2024
Journal Name
Biomass Conversion And Biorefinery
Chitosan-triphosphate/food grade algae/montmorillonite clay for adsorptive removal of methyl violet 2B dye removal: Behnken design optimization
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Biological Activates Studies of some New Derivatives From 2-aminoo-5-mercapto-1, 3, 4-thiadiazole
...Show More Authors

In this work, thiadiazole derivatives were prepared by taking advantage of active sites in (2-amino-5-mercapto-1, 3, 4-thiadiazole) as a starting material base. The main heterocyclic compounds (1, 3, 4-thiadiazole, oxazole) etc, 2-amino-5-mercapto-1,3,4-thiadiazole compound (1) was prepared by cyclic closure of thiosemicarbazide compound with anhydrous sodium carbonate and carbon disulfide. Oxidation of (1) via hydrogen peroxide, to have (2) which was treated with chloro acetyl chloride to get (3). Preparation of thiazole ring (4) was from reacting of (3) with thiourea. Synthesis of diazonium salts (5) from compound (4) using sodium nitrite and HCl. Compound (5) reacted with different ester compounds to prepare a new azo compounds (6–8).C

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Apr 29 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Cyclic Fatigue Resistance of Wave One Gold, F6 SkyTaper, One Curve, and AF Blue R3 NiTi Rotary Instrumentation Systems
...Show More Authors

Objective: This in vitro study is aimed to compare and evaluate the cyclic fatigue of four varying NiTi rotary instrumentation systems. Method: In this study, four types of rotary files were used in four groups (10 files for each group), namely, Group A: Wave One Gold; Group B: AF Blue R3; Group C: One Curve; Group D: F6 SkyTaper. These groups were evaluated by a cyclic fatigue apparatus to measure cyclic fatigue resistance within the artificial metallic simulating canal that has a 60 angle of curvature, the curvature radius was 5 mm, whereas the inner diameter of the canal was 1.5 mm. All the files were rotated in artificial canals until they fracture. The resistance to cyclic fatigue was determined by counting the number of cycles to frac

... Show More
Scopus (1)
Scopus
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (17)
Crossref (6)
Scopus Crossref