Preferred Language
Articles
/
jeasiq-2129
Using jack knife to estimation logistic regression model for Breast cancer disease
...Show More Authors

 

It is considered as one of the statistical methods used to describe and estimate the relationship between randomness (Y) and explanatory variables (X). The second is the homogeneity of the variance, in which the dependent variable is a binary response takes two values  (One when a specific event occurred and zero when that event did not happen) such as (injured and uninjured, married and unmarried) and that a large number of explanatory variables led to the emergence of the problem of linear multiplicity that makes the estimates inaccurate, and the method of greatest possibility and the method of declination of the letter was used in estimating A double-response logistic regression model by adopting the Jacknaev method and comparing the capabilities according to the information standard (AIC)

The Jackknife method and the aforementioned statistical capabilities were applied to study the relationship between the response variable (incidence and absence of breast cancer) for a sample size of (100) samples for the year (2020) and the explanatory variables (the percentage of haemoglobin present in red cells in the blood, red blood cells, white blood cells, Platelets, the percentage of haemoglobin in the blood, the percentage of lymphocytes in the blood, the percentage of monocytes, the percentage of eosinophils, the percentage of basophils) And it was evident through comparison that the character regression method in estimating the two-response logistic regression model is the best in estimating the parameters of the logistic regression model in the case of a problem of linearity

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Analytical Study of Bending Stresses and Deflections in Curved Beam Made of Laminated Composite Material
...Show More Authors

Abstract

 

Theoretical and experimental methodologies were assessed to test curved beam made of layered   composite material. The maximum stress and maximum deflection were computed for each layer and the effect of radius of curvature and curve shape on them. Because of the increase of the use of composite materials in aircraft structures and the renewed interest in these types of problems, the presented theoretical assessment was made using three different approaches: curved beam theory and an approximate 2D strength of material equations and finite element method (FEM) analysis by ANSYS 14.5 program for twelve cases of multi-layered cylindrical shell panel differs in fibe

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
The Effectiveness of Instructional Scaffolding Strategy in the Development of Academic Achievement and Critical Thinking in Female Second Year Secondary Students in Mathematics: محمد بن صنت الحربي , آمنة بنت سعيد بن جبل
...Show More Authors

This study aims to find out the effectiveness of instructional scaffolding strategy in the development of academic achievement and critical thinking of female second grade secondary mathematics students. Semi-experimental and relational descriptive method was used. The sample of the study consisted of (50) students divided into an experimental group and a control group. The experimental group was taught using scaffolding strategy whereas the control group was taught using traditional method. Pre- and Post-tests were used to achieve the objective of the study. The results of the study revealed that there are statistically significant differences in the mean scores of the experimental and control groups in the posttest for both the academi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
The prevalence and antimicrobial sensitivity of Esbl Escherichia Coli. in clinical isolates
...Show More Authors

Background: The antimicrobial resistance is one of the most serious and expanding health problems world -wide in the last decades. The esbl escherichia coli. (extended – spectrum beta-lactamase e.coli) represents an important aspect of it .Objectives: To get an overview on the esbl e.coli prevalence profile in general. Also to assess the antibiotic sensitivity of esbl e. coli trying to specify the most effective antibiotics in combating this micro-organism.Methods: this study tries to focus on this problem in Iraq which through a prospective study approach by taking 35 clinical samples from various sources (urine, blood, abscess, eye ,vagina ,stool and others),and after confirming the presence of e.coli, the presence of esbl e.coli and

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Spectrophotometric Assay of Salbutamol Sulphate in Pharmaceutical Preparations by Coupling with Diazotized ρ-bromoaniline
...Show More Authors

In this research, salbutamol sulphate (SAS) has been determined by a simple, rapid and sensitive spectrophotometric method. Salbutamol sulphate in this method is based on the coupling of SAS with diazotized ρ- bromoaniline reagent in alkaline medium of Triton X-100 (Tx) to form an orange azo dye which is stable and water-soluble. The azo dye is exhibiting maximum absorption at 441 nm. A 10 - 800 µg of SAS is obeyed of Beer's law in a final volume of 20 ml, i.e., 0.5- 40 ppm with ε, the molar absorptivity of 48558 L.mol-1.cm-1 and Sandell's sensitivity index of 0.01188 µg.cm-2. This new method does not need solvent extraction or temperature control which is well applied to determine SAS in d

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Asemi-Empirical Study of the Adsorption of Some Organic Pollutants on Modified Iraqi Clays
...Show More Authors

In this work semi–empirical method (PM3) calculations are carried out by (MOPAC) computational packages have been employed to calculate the molecular orbital's energies for some organic pollutants. The long– chain quaternary ammonium cations called Iraqi Clays (Bentonite – modified) are used to remove these organic pollutants from water, by adding a small cationic surfactant so as to result in floes which are agglomerates of organobentonite to remove organic pollutants. This calculation which suggests the best surface active material, can be used to modify the adsorption efficiency of aniline , phenol, phenol deriviatives, Tri methyl glycine, ester and pecticides , on Iraqi Clay (bentonite) by comparing the theoretical results w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Synthesis and investigation of structural and optical properties of CdO: Ag nanoparticles of various concentrations
...Show More Authors

This study discussed the effects of doping with silver (Ag) on the optical and structural properties of
CdO nanoparticles at different concentrations 0, 1, 2, 3, 4, 5 wt% prepared by the precipitation method. The
materials were annealed at 550˚C for 1 h. The structural, topographical, and optical properties were
diagnosed by X-ray diffraction analysis, atomic force instrument, and visible and ultraviolet spectrometers.
The results show that the average diameter of the grains depends on the percentage of added silver to the
material, as the diameter decreased from 88.8 to 59.7 nm, and it was found that the roughness increased from
5.56 to 26.5. When studying the optical properties, it was noted that th

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Obtaining an Empirical Earthquakes Duration Magnitude Formula from the Data of the Iraqi Meteorological Organization and seismology (IMOS)
...Show More Authors

     This paper calculated the Duration Magnitude (MD) equation using data from the Iraqi Meteorological Organization and seismology (IMOS). It is an empirically determined equation and expressed as:

The epicentral distance and local geological conditions affect the duration of the coda. The data is obtained from 7 seismic stations in the network. The new proposed duration magnitude equation results from applying linear regression analysis to the data of a seismic signal duration with correlation coefficient R2=0.76; and a standard deviation value of 0.049. Station corrections indicated by Sc are also specified for the seismic stations that range from -0.024 to + 0.02.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Aug 31 2022
Journal Name
Iraqi Journal Of Science
Generating Streams of Random Key Based on Image Chaos and Genetic Algorithm
...Show More Authors

    Today the Genetic Algorithm (GA) tops all the standard algorithms in solving complex nonlinear equations based on the laws of nature. However, permute convergence is considered one of the most significant drawbacks of GA, which is known as increasing the number of iterations needed to achieve a global optimum. To address this shortcoming, this paper proposes a new GA based on chaotic systems. In GA processes, we use the logistic map and the Linear Feedback Shift Register (LFSR) to generate chaotic values to use instead of each step requiring random values. The Chaos Genetic Algorithm (CGA) avoids local convergence more frequently than the traditional GA due to its diversity. The concept is using chaotic sequences with LFSR to gene

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref