Preferred Language
Articles
/
jeasiq-1892
Estimate the Partial Linear Model Using Wavelet and Kernel Smoothers
...Show More Authors

This article aims to estimate the partially linear model by using two methods, which are the Wavelet and Kernel Smoothers. Simulation experiments are used to study the small sample behavior depending on different functions, sample sizes, and variances. Results explained that the wavelet smoother is the best depending on the mean average squares error criterion for all cases that used.

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 18 2025
Journal Name
Misan Journal Of Academic Studies
Some of Parametric and Non Parametric Estimations for Circular Regression Model via Simulation
...Show More Authors

Circular data (circular sightings) are periodic data and are measured on the unit's circle by radian or grades. They are fundamentally different from those linear data compatible with the mathematical representation of the usual linear regression model due to their cyclical nature. Circular data originate in a wide variety of fields of scientific, medical, economic and social life. One of the most important statistical methods that represents this data, and there are several methods of estimating angular regression, including teachers and non-educationalists, so the letter included the use of three models of angular regression, two of which are teaching models and one of which is a model of educators. ) (DM) (MLE) and circular shrinkage mod

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 03 2022
Journal Name
Iraqi Journal Of Science
Accuracy Assessment of 3D Model Based on Laser Scan and Photogrammetry Data: Introduction
...Show More Authors

    A three-dimensional (3D) model extraction represents the best way to reflect the reality in all details. This explains the trends and tendency of many scientific disciplines towards making measurements, calculations and monitoring in various fields using such model. Although there are many ways to produce the 3D model like as images, integration techniques, and laser scanning, however, the quality of their products is not the same in terms of accuracy and detail. This article aims to assess the 3D point clouds model accuracy results from close range images and laser scan data based on Agi soft photoscan and cloud compare software to determine the compatibility of both datasets for several applications. College of Scien

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Aug 21 2023
Journal Name
Communications In Mathematical Biology And Neuroscience
Delay in eco-epidemiological prey-predator model with predation fear and hunting cooperation
...Show More Authors

It is recognized that organisms live and interact in groups, exposing them to various elements like disease, fear, hunting cooperation, and others. As a result, in this paper, we adopted the construction of a mathematical model that describes the interaction of the prey with the predator when there is an infectious disease, as well as the predator community's characteristic of cooperation in hunting, which generates great fear in the prey community. Furthermore, the presence of an incubation period for the disease provides a delay in disease transmission from diseased predators to healthy predators. This research aims to examine the proposed mathematical model's solution behavior to better understand these elements' impact on an eco-epidemi

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
guidance program Structured to address therapeutic cognitive emotional disorders (Anxiety and depression model)
...Show More Authors

           Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Engineering
Toward Improving BIM Acceptance in FM: A Conceptual Model Integrating TTF and TAM
...Show More Authors

Substantial research has been performed on Building Information Modeling (BIM) in various topics, for instance, the use and benefit of BIM in design, construction, sustainable environment building, and Facility assets over the past several years. Although there are various studies on these topics, Building Information Modeling (BIM) awareness through facilities management is still relatively poor. The researcher's interest is increased in BIM study is based heavily upon the perception that it can facilitate the exchange and reuse of information during various project phases. This property and others can be used in the Iraqi Construction industry to motivate the government to eliminate the change resistance to use innovat

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Numerical Solution for Classical Optimal Control Problem Governing by Hyperbolic Partial Differential Equation via Galerkin Finite Element-Implicit method with Gradient Projection Method
...Show More Authors

     This paper deals with the numerical solution of the discrete classical optimal control problem (DCOCP) governing by linear hyperbolic boundary value problem (LHBVP). The method which is used here consists of: the GFEIM " the Galerkin finite element method in space variable with the implicit finite difference method in time variable" to find the solution of the discrete state equation (DSE) and the solution of its corresponding discrete adjoint equation, where a discrete classical control (DCC) is given.  The gradient projection method with either the Armijo method (GPARM) or with the optimal method (GPOSM) is used to solve the minimization problem which is obtained from the necessary conditi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
Determination of some heavy Metals in tattoo Stickers in Children sweets available in local markets: Determination of some heavy Metals in tattoo Stickers in Children sweets available in local markets
...Show More Authors

The objective of this study is to determination the content of some heavy metals (lead, cadmium, chromium) in colored tattoo stickers. twelve kinds of colored tattoo stikcers were collected from Baghdad markets, it was estimated heavy metals using atomic absorption spectrophotometer (Shimadzu A5000). The results indicated the concentrations of lead in all samples (1.61_1.00 mg / kg) and chromium in the three samples (0.85_0.97 mg / kg) while other samples are free of chromium , and cadmium. These elements are the components of printing inks and dyes in tattoo stickers, and this does not conform to the health and safety conditions for the packaging of food according to the organizations of the health and safety of

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Estimation levels of CTHRC1and some cytokines in Iraqi patients with Rheumatoid Arthritis
...Show More Authors

Collagen triple helix repeat containing-1 (CTHRC1) is an essential marker for Rheumatoid Arthritis (RA), but its relationship with pro-inflammatory, anti-inflammatory, and inflammatory markers has been scantily covered in extant literature. To evaluate the level of CTHRC1 protein in the sera of 100 RA patients and 25 control and compare levels of tumour necrosis factor alpha (TNF-α), interleukin 10 (IL-10), RA disease activity (DAS28), and inflammatory factors. Higher significant serum levels of CTHRC1 (29.367 ng/ml), TNF-α (63.488 pg/ml), and IL-10 (67.1 pg/ml) were found in patient sera as compared to that in control sera (CTHRC1 = 15.732 ng/ml, TNF-α = 33.788 pg/ml, and IL-10 = 25.122 pg/ml). There was no significant correlation be

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref