Preferred Language
Articles
/
jeasiq-228
strong criminal capabilities، Using simulation .
...Show More Authors

The penalized least square method is a popular method to deal with high dimensional data ,where  the number of explanatory variables is large than the sample size . The properties of  penalized least square method are given high prediction accuracy and making estimation and variables selection

 At once. The penalized least square method gives a sparse model ,that meaning a model with small variables so that can be interpreted easily .The penalized least square is not robust ,that means very sensitive to the presence of outlying observation , to deal with this problem, we can used a robust loss function to get the robust penalized least square method ,and get robust penalized estimator and it can deal problems of dimensions and outliers .In this paper a compression had been made Sparse LTS estimator and MM Lasso by using simulation  and the simulation results show that the MM Lasso is best for every experiments, Depending on the criteria for the Mean Square Error, False Positive Rate and False negative Rate .      

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 28 2015
Journal Name
Al-khwarizmi Engineering Journal
Stabilizing Gap of Pole Electric Arc Furnace Using Smart Hydraulic System
...Show More Authors

Abstract

Electric arc furnace applications in industry are related to position system of its pole, up and down of pole. The pole should be set the certain gap. These setting are needed to calibrate. It is done manually. In this research will proposed smart hydraulic to make this pole works as intelligent using proportional directional control valve. The output of this research will develop and improve the working of the electric arc furnace. This research requires study and design of the system to achieve the purpose and representation using Automation Studio software (AS), in addition to mathematically analyzed and where they were building a laboratory device similar to the design and conduct experiments to stud

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Approximate Numerical Solutions for Linear Volterra Integral Equations Using Touchard Polynomials
...Show More Authors

In this paper, Touchard polynomials (TPs) are presented for solving Linear Volterra integral equations of the second kind (LVIEs-2k) and the first kind (LVIEs-1k) besides, the singular kernel type of this equation. Illustrative examples show the efficiency of the presented method, and the approximate numerical (AN) solutions are compared with one another method in some examples. All calculations and graphs are performed by program MATLAB2018b.

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing appli

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Performance Assessment of Solar-Transformer-Consumption System Using Neural Network Approach
...Show More Authors

Solar energy is one of the immeasurable renewable energy in power generation for a green, clean and healthier environment. The silicon-layer solar panels absorb sun energy and converts it into electricity by off-grid inverter. Electricity is transferred either from this inverter or from transformer, consumed by consumption unit(s) available for residential or economic purposes. The artificial neural network is the foundation of artificial intelligence and solves many complex problems which are difficult by statistical methods or by humans. In view of this, the purpose of this work is to assess the performance of the Solar - Transformer - Consumption (STC) system. The system may be in complete breakdown situation due to failure of both so

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
GEOMETRY OPTIMIZATION OF COUPLING ALLIN -METFORMIN USING DFT/B3LYP MOLECULAR MODELLING TECHNIQUE: GEOMETRY OPTIMIZATION OF COUPLING ALLIN -METFORMIN USING DFT/B3LYP MOLECULAR MODELLING TECHNIQUE
...Show More Authors

This researchpaper includes the incorporation of Alliin at various energy levels and angles 

With Metformin using Gaussian 09 and Gaussian view 06. Two computers were used in this work. Samples were generated to draw, integrate, simulate and measure the value of the potential energy surface by means of which the lowest energy value was (-1227.408au). The best correlation compound was achieved between Alliin and Metformin through the low energy values where the best place for metformin to b

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Journal Of Engineering
Traffic Simulation of Urban Street to Estimate Capacity
...Show More Authors

This research aimed to develop a simulation traffic model for an urban street with heterogeneous traffic capable of analyzing different types of vehicles of static and dynamic characteristics based on trajectory analysis that demonstrated psychophysical driver behavior. The base developed model for urban traffic was performed based on the collected field data for the major urban street in Baghdad city. The parameter; CC1 minimum headway (represented the speed-dependent of the safety distance from stop line that the driver desired) justified in the range from (2.86sec) to (2.17 sec) indicated a good match to reflect the actual traffic behavior for urban traffic streets. A good indication of the convergence between simulat

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Dec 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Modeling and Simulation of a Fire Tube Boiler
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Hydrology
Complementary data-intelligence model for river flow simulation
...Show More Authors

View Publication
Crossref (80)
Crossref