Preferred Language
Articles
/
jeasiq-1896
Comparison Between Tree regression (TR), and Negative binomial regression (NBR) by Using Simulation.
...Show More Authors

            In this paper, the process of comparison between the tree regression model and the negative binomial regression. As these models included two types of statistical methods represented by the first type "non parameter statistic" which is the tree regression that aims to divide the data set into subgroups, and the second type is the "parameter statistic" of negative binomial regression, which is usually used when dealing with medical data, especially when dealing with large sample sizes. Comparison of these methods according to the average mean squares error (MSE) and using the simulation of the experiment and taking different sample sizes where the results of simulation showed that the tree regression is best when the value of variance is large (5) and for all sample sizes model negative binomial regression when variance values (0.01, 0.5, 1) for all sample sizes, this method is superior to tree regression only when we take medium sample sizes.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Al-nahrain University
Toxic Heavy Metals in Soil and Some Plants in Baghdad, Iraq
...Show More Authors

Publication Date
Tue Sep 10 2024
Journal Name
Iraoi Academic Scientific Journals
The Psychological and Physical Life Difficulties of Patients with nerve fascicle
...Show More Authors

Publication Date
Thu Mar 07 2013
Journal Name
International Journal Of Pharma Sciences
Separation and Purification of Hemolysin from Local Isolate of Serratia marcescens
...Show More Authors

Twenty isolates of Serratia marcescens were isolated from inflammation of the urinary tract (UTI)., These isolates were found to produce hemolysin as indicated by blood agar plates in which the hemolysis of red blood cell indicate a positive result. Isolates were selected according to their hemolysis activity by measuring absorbance of hemoglobin at 405 nm that released from red blood cell. Hemolysin was completely purified using 50-75% saturation of ammonium sulphate followed by ion exchange chromatography with DEAE-cellulose then gel filtration chromatography by sepharose 4B. Accordingly molecular weight for the purified toxin was estimated as 45 KD.

Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
Antenatal, Intrapartum, and Postnatal Maternal health Care during COVID-19 Pandemic
...Show More Authors

There is limited data and evidence about the effects of COVID-19 on Maternal health, especially when new information is emerging daily, through pregnancy, child birth and post natal period, women are vulnerable to have the infection, this article, aimed to show the suitable measures that should be applied for women at reproductive age who are suspected /confirmed with COVID -19 infection,

During pregnancy it is advisable to continue the antenatal care schedule, although reducing face to face visit is recommended (unless the pregnant condition required that ),and prioritize ANC at health facilities for high-risk pregnancy and during second half of pregnancy with adequate infection prevention control  measures.

Regardi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Design, Synthesis and Preliminary Antimicrobial Evaluation of New Derivatives of Cephalexin
...Show More Authors

There is a continuous and massive need for newer cephalosporins that should have resistance against β-lactamases and can be used orally. An approach of using cephalexin, as a well-studied and potent antibacterial compound is considered to prepare new designed derivatives.  These derivatives include the incorporation of amino acid moiety linked through an amide bond with the α-amino group of cephalexin. Certain aliphatic amino acids were used, such as glycine, alanine, valine and proline. The chemical structures of these derivatives were confirmed by IR spectroscopy and elemental analyses. All the synthesized compounds were subjected for preliminary evaluation of antimicrobial activity using well diffusion method, against certa

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 20 2020
Journal Name
International Journal Of Pharmaceutical Research
Synthesis, Characterization and Biological Activity of New Compounds Derived from Dapsone
...Show More Authors

New derivatives of the anti-inflammatory, leprostatic drug dapsone 4 are synthesized, characterized and biologically screened by the treating the drug dapsone with chloroacetyl chloride in the presence of base. Both amino groups are acylated to give compound 6. The symmetrical acylated product then treated with Phenol, N-Acetyl-p-aminophenol, p-Chlorophenol, m-Chlorophenol, o-Hydroxybezoic acid and m-Hydroxybezoic acid to give compounds 8(a-f). The antimicrobial activity was tested for the synthesized compounds; activates were good compared to the parent drug. All the new compounds have scanned for their biological activities toward gram ‒ve and gram +ve (M. tuberculosis, S. pneumoniae, E. coli and P. mirabilis) bacteria, the synthesized

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Ssrn Electronic Journal
Silence as a Tactic of Communication in Pragmatics, Novel, and Poetry
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Laser Cutting Methods on Hole Deviation and Surface Integrity
...Show More Authors

In the present work usedNd:YAG laser systems of different output characteristic were employed to study the drilling process of material used in scientific and industrial fields. This material include Manganese hard steel. Our study went into the affecting parameters in drilling of Manganese hard steel by laser. Drilling process is achieved through material absorption of part of the incident laser beam. It is the resultant of interfering both, laser beam and material properties and the focusing conditions of the beam. The results as shown that the increase in the laser pulse energy over the used level has raised the hole diameter, depth and increased the hole taper. In addition to that a hole taper was affected by the laser energy, the fo

... Show More
View Publication Preview PDF