Preferred Language
Articles
/
jeasiq-231
Applied Study on Analysis of Fixed, Random and Mixed Panel Data Models Measured at specific time intervals
...Show More Authors

This research sought to present a concept of cross-sectional data models,  A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel  data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the years of service of the working individual and the academic achievement of him and the classifier starting with (graduates of the intermediate school or below, graduates of the preparatory school, graduates of institutes, graduates of colleges and universities) Finally sex was divided into two categories: male and female The sample of the research is a group of individuals (100) individuals working in private sector companies with different commercial agencies in Baghdad with financial, administrative, technical, sales and services sectors, namely, the research community And then to extract the estimates of the parameters of the models and the Variations of errors as well as their testing and analysis where it was observed how to control the heterogeneity of variance and increase in degrees of freedom and less multicollinearity among the variables, which illustrates the efficiency and importance and accuracy of this type of models and their importance in making sound decisions and reliable results The results also showed the importance of the years of service on the performance of the working individual and the increase in productivity and efficiency, adding to the practical experience of utmost importance, as well as distinguished individuals working in the achievement of university degree on the rest of the other educational collections. 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Rooting non-violence in the Holy Quran And models of the Prophet application
...Show More Authors

The term “non-violence” is a means of political, social, and advocacy that excludes force in reaching its objectives, and lacks infringement of the rights of non-violence. The policy of non-violence is a beautiful logic of the whole of Islamic creation, in that it is an integral part of the whole structure of Islam and it is a policy of brilliant and brilliant saying in the Almighty: `` Neither level nor good or bad, pay what is better, If that between you and him enmity as if he were intimate guardian (Suratvsalat, verse: 34. Has According to the prophet of Islam, it means that God gives to kindness (kindness) what does not give to violence (Sunan Abu Dawood, 4/255). These terms accurately communicate what is meant by violence and n

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2023
Journal Name
Alustath Journal For Human And Social Sciences
كاریگەری ستراتیژییەتی بەستن و ڕاكێشان لەسەر دەسكەوتی فێرخوازانی پۆلی هەشتەمی بنەڕەتی له بابەتی زمان و ئەدەبی كوردیدا/ اثر استراتيجية الشد والجذب في تحصيل طلاب الصف الثامن الاساسي في مادة اللغة والادب
...Show More Authors

Preview PDF
Publication Date
Thu Jan 28 2016
Journal Name
Saudi Journal Of Pathology And Microbiology
Chelation Trends and Antibacterial Activity of Some Mixed Ligand Chelates
...Show More Authors

Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
International Journal Of Science And Research
Synthesis and Spectroscopic Characterization of some Mixed Schiff Base Complexes
...Show More Authors

Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
International Journal Of Humanities And Social Sciences/ Rimak
AN EMPIRICAL ANALYSIS OF EDUCATIONAL RESEARCH BASED ON CRITICAL DISCOURSE ANALYSIS
...Show More Authors

APDBN Rashid, International Journal of Humanities and Social Sciences/ RIMAK, 2023

View Publication
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Batch and Fixed-Bed Modeling of Adsorption Reactive Remazol Yellow Dye onto Granular Activated Carbon
...Show More Authors

In this work, the adsorption of reactive yellow dye (Remazol yellow FG dye) by granular activated carbon (GAC) was investigated using batch and continuous process. The batch process involved determination the equilibrium isotherm curve either favorable or unfavorable by estimation relation between adsorption capacity and concentration of dye at different dosage of activated carbon. The results were fitted with equilibrium isotherm models Langmuir and Freundlich models with R2value (>0.97). Batch Kinetic study showed good fitting with pseudo second order model with R2 (0.987) at contact time 5 h. which provesthat the adsorption is chemisorptions nature. Continuous study was done by fixed bed column where breakthrough time was increased

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Nov 26 2018
Journal Name
Arab Science Heritage Journal
دراسة دراسة عن جغرافية وسكان منطقة البطيحة جنوب العراق
...Show More Authors

Before displaying that study we must clarify the nature of this area, wonderful, strange and great world of AL-Bateeha. Its life was simple, easy and comfortable –Human beings in this world were self-sufficient with regards to food, drinks and all other life requirements because and that of presence so many creatures there, for example, birds, fish and lots of plants that humans used as food for them and their animals. Therefore that area formed an isolated environment and far from incursion and uneasy to control

View Publication Preview PDF
Publication Date
Wed Jun 01 2005
Journal Name
Alustath Journal For Human And Social Sciences
An evaluation study of Islamic websites on the Internet
...Show More Authors

The study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla

... Show More
Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (20)
Crossref (11)
Scopus Crossref