Preferred Language
Articles
/
jeasiq-228
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and it can deal problems of dimensions and outliers .In this paper a compression had been made Sparse LTS estimator and MM Lasso by using simulation  and the simulation results show that the MM Lasso is best for every experiments, Depending on the criteria for the Mean Square Error, False Positive Rate and False negative Rate .      

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Knowledge value added methodology between theory and application Comparative filed research in some of the Iraqi private banks
...Show More Authors

Abstract

        The research to have a clear perceptions about the knowledge value added to assess the knowledge resources of the Iraqi private banks, depending on the value added methodology of the proposed defined (Housel & Bell, 2001), which assumes that the  knowledge value added come through synergetic relationship between knowledge resource and information technology, trying to the possibility of mainstream theory and its application in the Iraqi environment and interpretation of results, and on this basis was launched search of a research problem took root synergetic nature of the relationship between knowledge (human)  resource and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Use some of the quality tools to improve the health service: Comparative research between Baghdad's and Yarmouk hospital educational
...Show More Authors

Abstract

This research aims to improve the provided health service level inside Baghdad hospitals and the Yarmouk educational, as well as to shed light on the reality of the health service and the quality within the major operations room in both hospitals, as the operations room represent the research community, as was the use of some quality tools Pareto and Ishikawa diagram to measure and assess the level of quality provided, and include research problem to find out what are the problems and obstacles facing the process of improving quality in both hospitals, and whether there are scientifically accurate method to assess the quality of health service in Baghdad's Yarmouk hospital and educational . Where the researcher h

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
A New Structure for Cascaded Single-Stage Distributed Amplifier Using Proposed Active Inductor Loads
...Show More Authors

A modification to cascaded single-stage distributed amplifier (CSSDA) design by using active inductor is proposed. This modification is shown to render the amplifier suitable for high gain operation in small on-chip area. Microwave office program simulation of the Novel design approach shows that it has performance compatible with the conventional distributed amplifiers but with smaller area. The CSSDA is suitable for optical and satellite communication systems.

View Publication Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة بين طرائق تقدير معالم الانحدار عند وجود مشكلة عدم تجانس التباين مع التطبيق العملي
...Show More Authors

In this research weights, which are used, are estimated using General Least Square Estimation to estimate simple linear regression parameters when the depended variable, which is used, consists of two classes attributes variable (for Heteroscedastic problem) depending on Sequential Bayesian Approach instead of the Classical approach used before, Bayes approach provides the mechanism of tackling observations one by one in a sequential way, i .e each new observation will add a new piece of information for estimating the parameter of probability estimation of certain phenomenon of Bernoulli trials who research the depended variable in simple regression  linear equation. in addition to the information deduced from the past exper

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Path Planning of an autonomous Mobile Robot using Swarm Based Optimization Techniques
...Show More Authors

This paper presents a meta-heuristic swarm based optimization technique for solving robot path planning. The natural activities of actual ants inspire which named Ant Colony Optimization. (ACO) has been proposed in this work to find the shortest and safest path for a mobile robot in different static environments with different complexities. A nonzero size for the mobile robot has been considered in the project by taking a tolerance around the obstacle to account for the actual size of the mobile robot. A new concept was added to standard Ant Colony Optimization (ACO) for further modifications. Simulations results, which carried out using MATLAB 2015(a) environment, prove that the suggested algorithm outperforms the standard version of AC

... Show More
View Publication Preview PDF
Crossref (22)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Low Cost Heart Rate Monitor Using Led-Led Sensor
...Show More Authors

A high sensitivity, low power and low cost sensor has been developed for photoplethysmography (PPG) measurement. The PPG principle was applied to follow the dilatation and contraction of skin blood vessels during the cardiac cycle. A standard light emitting diodes (LEDs) has been used as a light emitter and detector, and in order to reduce the space, cost and power, the classical analogue-to-digital converters (ADCs) replaced by the pulse-based signal conversion techniques. A general purpose microcontroller has been used for the implementation of measurement protocol. The proposed approach leads to better spectral sensitivity, increased resolution, reduction in cost, dimensions and power consumption. The basic sensing configuration prese

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2010
Journal Name
Al-khwarizmi Engineering Journal
355nm Wavelength Generation of Nd:YAG Laser Using Olive Oil
...Show More Authors

 This project introduces a prospective material for photonic laser applications. The material is olive oil which is classified as organic compound, having a good nonlinear optical properties candidate to be used in photonic applications. A high purity sample of olive oil has been used. The theoretical calculation to generate third harmonic wave using olive oil has been determine using MATLAB program. THG (λ=355nm) intensity has been determined at two cases of sample thicknesses 1mm and 10mm. The minimum threshold incident intensity to obtain THG intensity are equal Iω=7530 mW/cm2 at L=1mm and Iω= 6220 mW/cm2 at L=10mm. The possibility of generation of third harmonic in olive oil inside

... Show More
View Publication Preview PDF