Preferred Language
Articles
/
jeasiq-228
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and it can deal problems of dimensions and outliers .In this paper a compression had been made Sparse LTS estimator and MM Lasso by using simulation  and the simulation results show that the MM Lasso is best for every experiments, Depending on the criteria for the Mean Square Error, False Positive Rate and False negative Rate .      

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Simulation of Temperature Distribution in TIG Spot Welds of (Al-Mg) Alloy Using Finite Element Method
...Show More Authors

      This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type  (5052-O).

      The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented  the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot.   &nbs

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Software Security using Aspect-Oriented Software Development
...Show More Authors

Aspect-Oriented Software Development (AOSD) is a technology that helps achieving
better Separation of Concern (SOC) by providing mechanisms to identify all relevant points
in a program at which aspectual adaptations need to take place. This paper introduces a
banking application using of AOSD with security concern in information hiding.

View Publication Preview PDF
Publication Date
Tue Jan 23 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ESTIMATION OF SOME CHEMICAL AND PHYSICAL PROPERTIES USING A WATER TREATMENT UNIT VORTISAND COMPARED TO THEIR CONCENTRATION IN WATER PRODUCED BY TRIDINTINAL DRINKING WATER PROJECTS IN BAGHDAD.: ESTIMATION OF SOME CHEMICAL AND PHYSICAL PROPERTIES USING A WATER TREATMENT UNIT VORTISAND COMPARED TO THEIR CONCENTRATION IN WATER PRODUCED BY TRIDINTINAL DRINKING WATER PROJECTS IN BAGHDAD.
...Show More Authors

This study was conducted to determine the ability of water treatment system (Vortisand) to reduce some chemical and physical properties for tigris river raw water, It consisted of turbidity, electrical conductivity, pH, total hardness, calcium Hardness as well as temperature in order to determine the unit`s efficiency for reducing their concentration as compared to those in the water produced by some classical potable water projects (Dora and Wathba) in Baghdad. Samples were collected during the cold months (December 2016 and January 2017) and during the hot months (May and June 2017). The results showed that this system has the ability to reduce some properties such as turbidity, the values were 215NTU in raw water and decreased to NTU

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Direction Finding Using GHA Neural Networks
...Show More Authors

 This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).

 

 

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Degradation of Indigo Dye Using Quantum Mechanical Calculations
...Show More Authors

The semiempirical (PM3) and DFT quantum mechanical methods were used to investigate the theoretical degradation of Indigo dye. The chemical reactivity of the Indigo dye was evaluated by comparing the potential energy stability of the mean bonds. Seven transition states were suggested and studied to estimate the actually starting step of the degradation reaction. The bond length and bond angle calculations indicate that the best active site in the Indigo dye molecule is at C10=C11.  The most possible transition states are examined for all suggested paths of Indigo dye degradation predicated on zero-point energy and imaginary frequency. The first starting step of the reaction mechanism is proposed. The change in enthalpy, Gibbs free energ

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة بعض طرائق التعويض الأحادي للبيانات المفقودة لدالة الكثافة الاحتمالية للتوزيع الطبيعي ثنائي المتغيرات
...Show More Authors

In this paper we suggest new method to estimate the missing data  in bivariate normal distribution and compare it with Single Imputation  method (Unconditional mean and Conditional mean) by using simulation. 

 

View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Results In Engineering
Stability analysis for the phytoplankton-zooplankton model with depletion of dissolved oxygen and strong Allee effects
...Show More Authors

View Publication Preview PDF
Scopus (20)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
تصميم نموذج دعم قرار الاستبدال باستعمال المحاكاة
...Show More Authors

        تظهر الحاجة إلى الاستثمارات الرأسمالية من عدة مصادر كالحاجة إلى توسيع المنشآت الإنتاجية ، أو استجابة لحاجات المجتمع كشراء مكائن ومعدات لتخفيض تلوث الماء والهواء. أما أهم مصادر الحاجة لرؤوس الأموال فإنها تأتي من الموجودات الإنتاجية (باستثناء الأرض) ، حيث تستهلك هذه الموجودات (المكائن والآلات والعُدد) بشكل مستمر جراء الاستخدام ، فالمكائن، مثلا ، تسير دائما في طريقها نحو أكوام الخردة وال

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Detecting Textual Propaganda Using Machine Learning Techniques
...Show More Authors

Social Networking has dominated the whole world by providing a platform of information dissemination. Usually people share information without knowing its truthfulness. Nowadays Social Networks are used for gaining influence in many fields like in elections, advertisements etc. It is not surprising that social media has become a weapon for manipulating sentiments by spreading disinformation.  Propaganda is one of the systematic and deliberate attempts used for influencing people for the political, religious gains. In this research paper, efforts were made to classify Propagandist text from Non-Propagandist text using supervised machine learning algorithms. Data was collected from the news sources from July 2018-August 2018. After annota

... Show More
View Publication Preview PDF
Scopus (26)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref