Preferred Language
Articles
/
jeasiq-228
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and it can deal problems of dimensions and outliers .In this paper a compression had been made Sparse LTS estimator and MM Lasso by using simulation  and the simulation results show that the MM Lasso is best for every experiments, Depending on the criteria for the Mean Square Error, False Positive Rate and False negative Rate .      

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Image classification with Deep Convolutional Neural Network Using Tensorflow and Transfer of Learning
...Show More Authors

The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة بعض معايير تحديد الرتبة لانموذج الانحدار الذاتي (الطبيعي وغير الطبيعي) من الرتبة الاولـى بأستخدام المحاكـاة
...Show More Authors

The search is contain compared among some order selection criteria  (FPE,AIC,SBC,H-Q) for the Model first order  Autoregressive when the White Noise is follow Normal distribution and some of non Gaussian distributions (Log normal, Exponential and Poisson distribution ) by using Simulation  

 

View Publication Preview PDF
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Tissue Welding Using (800±10nm) Diode and (1064nm) Nd: YAG Lasers
...Show More Authors

Joining tissue is a growing problem in surgery with the advancement of the technology and more precise and difficult surgeries are done. Tissue welding using laser is a promising technique that might help in more advancement of the surgical practice. Objectives: To study the ability of laser in joining tissues and the optimum parameters for yielding good welding of tissues. Methods: An in-vitro study, done at the Institute of Laser, Baghdad University during the period from October 2008 to February 2009. Diode and Nd-YAG lasers were applied, using different sessions, on sheep small intestine with or without solder to obtain welding of a 2-mm length full thickness incision. Different powers and energies were used to get maximum effect. Re

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Electrical Engineering
A Study of the Influence of Steel Brushes in Rail Surface Magnetic Flux Leakage Detection Using Finite Elements Simulation
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Non-Destructive Damage Assessment of Five Layers Fiber Glass / Polyester Composite Materials Laminated Plate by Using Lamb Waves Simulation
...Show More Authors

Composite materials are widely used in the engineered assets as aerospace structures, marine and air navigation owing to their high strength/weight ratios. Detection and identification of damage in the composite structures are considered as an important part of monitoring and repairing of structural systems during the service to avoid instantaneous failure. Effective cost and reliability are essential during the process of detecting. The Lamb wave method is an effective and sensitive technique to tiny damage and can be applied for structural health monitoring using low energy sensors; it can provide good information about the condition of the structure during its operation by analyzing the propagation of the wave in the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
مجلة الدنانير
تأثير بناء المقدرات الجوهرية في إدارة الإيرادات الضريبية/ بحث تحليلي في الهيئة العامة للضرائب
...Show More Authors

هدف البحث الى بيان تأثير بناء المقدرات الجوهرية المتمثل ابعادها بـ (التعلم التنظيمي ، المرونة الاستراتيجية ، المقدرات التكنولوجية، رأس المال البشري) في ادارة الايرادات الضريبية المتمثلة ابعادها بـ (فاعلية الادارة الضريبية ، الكفاءة في العمل ، التشريعات الضريبية) وتم اعتماد الاستبانة كأداة رئيسة في جمع البيانات والمعلومات من العينة البالغ عددها (35) مبحوثاً ممن هم بموقع (مدير قسم ، وكيل مدير قسم، مسؤول شعبة) ف

... Show More
Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Quality of Work Life in Reinforcing Core Competencies: A Descriptive and analytical research in the Ministry of Health
...Show More Authors

The research aims to diagnose the shortcomings and weaknesses in applying the dimensions of the quality of work life and the extent of their impact on employees’ attitudes and behaviors, and thus their relationship to enhancing their core competencies. The scientific value of the research stems from highlighting the importance of the dimensions of the quality of professional life in improving the productive efficiency of workers in the public sector and raising the level of organizational performance. Because the quality of working life plays an important role in enhancing the core competencies of employees in the public sector, it can also be an incentive or a disincentive for any employee by adapting to the economic and social condit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Obstacles Avoidance for Mobile Robot Using Enhanced Artificial Potential Field
...Show More Authors

In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint

... Show More
View Publication Preview PDF