Preferred Language
Articles
/
jeasiq-1978
Comparison of the performance of some r- (k,d) class estimators with the (PCTP) estimator that used in estimating the general linear regression model in the presence of autocorrelation and multicollinearity problems at the same time "
...Show More Authors

In the analysis of multiple linear regression, the problem of multicollinearity and auto-correlation drew the attention of many researchers, and given the appearance of these two problems together and their bad effect on the estimation, some of the researchers found new methods to address these two problems together at the same time. In this research a comparison for the performance of the Principal Components Two Parameter estimator (PCTP) and The (r-k) class estimator and the r-(k,d) class estimator by conducting a simulation study and through the results and under the mean square error (MSE) criterion to find the best way to address the two problems together. The results showed that the r-(k,d) class estimator is the best estimator.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 14 2018
Journal Name
Arab Science Heritage Journal
الثروة الثروة المائية في المغرب العربي من القرن 4 – 7 هـ/ 10 م – 13 م دراسة تاريخية
...Show More Authors

Water resources would be differentiate in Morocco specially in Morocco  which appear as form of eyes ,rivers as dissolved water of mountain.

The human takes care of water either as rains to store and use in necessity trying to bring it to Maracas  by  helping from state .

The religious  tried to dig wells to emphasize that water is rumored and do not monopolized.

View Publication Preview PDF
Publication Date
Thu Jan 01 2009
Journal Name
مجلة كلية الاداب جامعة بغداد
العلاقات العامة وادارة الازمات في المؤسسات الصحية دراسة مسحية لبرامج وزارة الصحة الخاصة بمرض الكوليرا لسنة 2008
...Show More Authors

تواجه المؤسسات المختلفة تحديات كثيره تختلف نوعيتها باختلاف توجهات المؤسسه سياسيه او اقتصادية او اجتماعيه ... مما يشكل تهديدا لوجود المؤسسة وسمعتها وبخاصه عند تحول تلك التحديات الى ازمات يجب على المؤسسه التعامل معها والسيطره عليها واحتوائها وهنا ياتي دور ادارة العلاقات العامه في المؤسسه المعنيه للعمل والقيام باعداد برامج خاصه بالتعامل مع الازمات وهو مايعرف ببرامج اداره الازمات . وبطبيعة الحال تختلف عملية

... Show More
Publication Date
Wed Jun 22 2022
Journal Name
Arab Science Heritage Journal
منهج القزويني "ت682هـ ـ 1283م " في دراسة النبات بكتابهِ "عجائب المخلوقات وغرائب الموجودات " أ.د. الاء نافع جاسم
...Show More Authors

    he is one of the most prominent Arab personalities who contributed in the Arab Muslim world, scholars and historians who appeared in the seventh century AH - the thirteenth century AD, contributed to enrich the Arab scientific heritage in his distinguished book “The Wonders of Creatures and the Strangeness of Existences” because it contained what God Almighty created and the oddities on dry land and water

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 30 2013
Journal Name
College Of Islamic Sciences
 المسائل المتعلقة بالأسماء الثابتة لله (عزوجل) الواردة في (مرعاة المفاتيح شرح مشكاة المصابيح، لأبي الحسن المباركفوري (ت1414هـ).
...Show More Authors

The research deals with the issues related to the fixed names of God U, which are from a set of issues mentioned in the Book of Observations of the Keys Explaining the Mishkat al-Masbah by Abu Al-Hasan Al-Mubarakfory (d. 141 AH). It included five demands: the first of them is in proving and identifying the most beautiful names and divisions of God, and the second in the name, name and name. And the third: It was in their number, while the fourth: in deriving the names, is it suspensive or not? And Fifth: The Compilation of Allah’s Most Beautiful Names.

View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
مجلة العلوم التربوية والنفسية
معوقات تدريس المواد التربوية والنفسية في كلية التربية – ابن الهيثم من وجهة نظر أعضاء هيئة التدريس فيها
...Show More Authors

Publication Date
Mon Jul 01 2019
Journal Name
المجلة المصرية لبحوث الأعلام
دوافع تعرض طلبة أقسام اللُّغة الإنکليزية في جامعة بغداد للقنوات الفضائية الناطقة باللُّغة الإنکليزية والإشباعات المتحققة عنه:
...Show More Authors

تلخصت مشکلة هذا البحث في التعرف على الدوافع التي تقف وراء تعرض الطلبة الدارسين في أقسام اللُّغة الإنکليزية للقنوات الفضائية الناطقة باللُّغة الإنکليزية والإشباعات المتحققة عن هذا التعرض في هذا المجتمع الخاص الذي يشکل بيئة اجتماعية علمية محددة، عن طريق تطبيق نظرية الإستخدامات والإشباعات في إطار المجتمعات الخاصة، وسعى هذا البحث إلى تحقيق ثلاثة أهداف هي، قياس استخدامات لطلبة الدارسين في أقسام اللُّغة الإنک

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 04 2023
Journal Name
Arab Science Heritage Journal
المدراس الثانوية في الاعظمية ( ثانوية كلية بغداد- ثانوية الأعظمية للبنين – ثانوية الأعظمية للبنات - ثانوية الحريري للبنات) أنموذجاً
...Show More Authors

Education received the attention of the monarchy in Iraq, especially after the developments that the country witnessed after Iraq gained independence and joined the League of Nations in 1932 AD in all political, economic and cultural aspects.  In this regard, due to its distinguished geographical location, where the atmosphere, the natural environment and the religious and political standing were available, which made it a center of attraction for most Iraqi families and political figures.  Learning and pioneering the path of knowledge, so it witnessed a great prosperity in secondary education, so several important schools appeared that contributed to advancing the wheel of learning forward, including Baghdad College High Schoo

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sun Mar 04 2012
Journal Name
Baghdad Science Journal
Land Magnetic survey along a profile from Akaz to Rutba town and its applications
...Show More Authors

A land magnetic survey was carried out along regional profile, which is located at the north part of the Iraqi western desert. It starts from al –Qaam City (at north) toward Rutba City (at south) with a total length of 238km. The survey was carried out along the paved road between the two cities, About 113 measuring points were done with inter-station distance of 2 km (for 198 km) and 2 to 5km (for 40km). Two proton magnetometers were used in this survey. One of them is used for base station monitoring, which was fixed as of Salah Aldin field (Akkas). Its readings were used for diurnal corrections. All magnetic measurements were corrected for normal and topographic corrections. The readings were reduced to a certain base level. The resu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref