Preferred Language
Articles
/
jeasiq-1896
Comparison Between Tree regression (TR), and Negative binomial regression (NBR) by Using Simulation.
...Show More Authors

            In this paper, the process of comparison between the tree regression model and the negative binomial regression. As these models included two types of statistical methods represented by the first type "non parameter statistic" which is the tree regression that aims to divide the data set into subgroups, and the second type is the "parameter statistic" of negative binomial regression, which is usually used when dealing with medical data, especially when dealing with large sample sizes. Comparison of these methods according to the average mean squares error (MSE) and using the simulation of the experiment and taking different sample sizes where the results of simulation showed that the tree regression is best when the value of variance is large (5) and for all sample sizes model negative binomial regression when variance values (0.01, 0.5, 1) for all sample sizes, this method is superior to tree regression only when we take medium sample sizes.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 17 2021
Journal Name
Political Sciences Journal
Pending issues between the federal government and the Kurdistan region (Constitutional and legal solutions)
...Show More Authors

The federal state is usually based on a number of regions because it is based on the multiplicity of political entities. The federal experiments were based on the existence of two or more regions and each federal system has its own peculiarities. Administrative authority between the federal government and local elected bodies of local people of absolute relative independence does not threaten the entity of the state according to the Constitution and the law and on a regional or reformer basis and exercise its powers within the legal scope prescribed The relationship between the federal authority and the Kurdistan region is the first level of the relationship on the real level, especially since no other region in Iraq has been formed exce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 29 2022
Journal Name
Al–bahith Al–a'alami
Digital media and linguistic evaluation between the need to stay and the idea of dispensing
...Show More Authors

In spite of the contemporary development over the world in pertaining of modernization and its differences about the transformation of the knowledge but, the important instrument to transfer the thoughts and information did not have change except the language. So the evolutionary process became as a torrent or fusillade above the cliff which drifted anything. So that the objective inquiry and impressed with varieties of development the casement to evaluate the linguistic or re - correction highlight article in order to preserve on the origins of the language and its sobriety.
Today, we have different correspondence and social media as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Aggregate production planning using linear programming with practical application
...Show More Authors

Abstract :

The study aims at building a mathematical model for the aggregate production planning for Baghdad soft drinks company. The study is based on a set of aggregate planning strategies (Control of working hours, storage level control strategy) for the purpose of exploiting the resources and productive capacities available in an optimal manner and minimizing production costs by using (Matlab) program. The most important finding of the research is the importance of exploiting during the available time of production capacity. In the months when the demand is less than the production capacity available for investment. In the subsequent months when the demand exceeds the available energy and to minimize the use of overti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Correlation between Serum and Tissue Markers in Breast Cancer Iraqi Patients
...Show More Authors

Breast cancer is the most prevalent malignancy among women worldwide, in Iraq it ranks the first among the population and the leading cause of cancer related female mortality. This study is designed to investigate the correlations between serum and tissue markers in order to clarify their role in progression or regression breast cancer. Tumor Markers are groups of substances, mainly proteins, produced from cancer cell or from other cells in the body in response to tumor.  The study was carried out from April 2018 to April 2019 with total number of 60 breast cancer women. The blood samples were collected from breast cancer women in postoperative and pretherapeutic who attended teaching oncology hospital of the medical city in Baghdad and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Visible image watermarking using biorthogonal wavelet transform
...Show More Authors

In this paper, visible image watermarking algorithm based on biorthogonal wavelet
transform is proposed. The watermark (logo) of type binary image can be embedded in the
host gray image by using coefficients bands of the transformed host image by biorthogonal
transform domain. The logo image can be embedded in the top-left corner or spread over the
whole host image. A scaling value (α) in the frequency domain is introduced to control the
perception of the watermarked image. Experimental results show that this watermark
algorithm gives visible logo with and no losses in the recovery process of the original image,
the calculated PSNR values support that. Good robustness against attempt to remove the
watermark was s

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
Cache Coherence Protocol Design and Simulation Using IES (Invalid Exclusive read/write Shared) State
...Show More Authors

To improve the efficiency of a processor in recent multiprocessor systems to deal with data, cache memories are used to access data instead of main memory which reduces the latency of delay time. In such systems, when installing different caches in different processors in shared memory architecture, the difficulties appear when there is a need to maintain consistency between the cache memories of different processors. So, cache coherency protocol is very important in such kinds of system. MSI, MESI, MOSI, MOESI, etc. are the famous protocols to solve cache coherency problem. We have proposed in this research integrating two states of MESI's cache coherence protocol which are Exclusive and Modified, which responds to a request from reading

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Borrowing in a diwan Moon Tree for Nazik Angels
...Show More Authors

The moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever exam

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 16 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison between powerful Waterpik flosser with dental floss as an adjunct to tooth brushing
...Show More Authors

Background: Removing dental plaque is important to maintain a good oral hygiene and prevent periodontal disease; this could not be accomplished by the use of toothbrush alone, it needs the help of interdental aids or intra-oral irrigator devices. The aim of this study was to compare the effect of using Waterpik flosser as adjunct to tooth brushing than using the dental floss with the brushing. Materials and methods: A single blind, six weeks study included 45 subjects divided into three groups of 15 subjects at each group. Group B (brushing) was instructed to use the toothbrush only, group BF (brushing & flossing) was instructed to use dental floss and tooth brushing while group BW (brushing and Waterpik flosser) was instructed to use Water

... Show More
View Publication Preview PDF