In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreIn this paper, we investigate the automatic recognition of emotion in text. We perform experiments with a new method of classification based on the PPM character-based text compression scheme. These experiments involve both coarse-grained classification (whether a text is emotional or not) and also fine-grained classification such as recognising Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method significantly outperforms the traditional word-based text classification methods. The results show that the PPM compression based classification method is able to distinguish between emotional and nonemotional text with high accuracy, between texts invo
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show MoreThe reduction to pole of the aeromagnetic map of the western desert of Iraq has been used to outline the main basement structural features. Three selected magnetic anomalies are used to determine the depths of their magnetic sources. The estimated depths are obtained by using slope half slope method and have been corrected through the application of a published nomogram. These depths are compared with previous published depth values which provide a new look at the basement of the western desert in addition to the thickness map of the Paleozoic formations. The results shed light on the important of the great depths of the basement structures and in turn the sedimentary cover to be considered for future hydrocarbon exploration
In this paper, time spent and the repetition of using the Social Network Sites (SNS) in Android applications are investigated. In this approach, we seek to raise the awareness and limit, but not eliminate the repeated uses of SNS, by introducing AndroidTrack. This AndroidTrack is an android application that was designed to monitor and apply valid experimental studies in order to improve the impacts of social media on Iraqi users. Data generated from the app were aggregated and updated periodically at Google Firebase Real-time Database. The statistical factor analysis (FA) was presented as a result of the user’s interactions.
To study the striking perturbations of ionospheric Total Electron Content (TEC) before, during, and after the earthquake (M≥5) for earlier prediction to avoid calamities, ionospheric TEC data are taken by using red shift technique from two-frequencies GPS signals.. Tohoku earthquake on 11th March 2011 is chosen as case of our study (A magnitude M9.0 earthquake reported by the US Geological Survey gives its origin time at 05:46:23 UTC; the epicenter was located at 38.322oN, 142.369oE of the east coast of Honshu). The study was made 15 days before and 15 days after earthquake occurred over Japan at four different geographic positions, Kokubunji (35.7oN, 139.5oE), Wakkanai (45.2oN, 141.8oE), Yamagawa (31.2oN, 130.6oE) and Okinawa (26.7oN,
... Show MoreThe Effect of the Addie and Shayer Model on the Achievement of Fifth Grade Students and their Attitudes towards History
- Ahmed Hashim Mohammed and Hadil Jassas Ali
University of Baghdad - College of Education for Women
Abstract
The current research aims to examine the effect of the Adi and Shayer model on the achievement of fifth-grade students and their attitudes toward history. To achieve the research objective, the researcher has adopted two null hypotheses. 1) there is no statistically significant difference at the level o
... Show MoreReservoir study has been developed in order to get a full interesting of the Nahr Umr formation in Ratawi oil field. Oil in place has been calculated for Nahr Umr which was 2981.37 MM BBL. Several runs have been performed to get matching between measured and calculated of oil production data and well test pressure. In order to get the optimum performance of Nahr Umr many strategies have been proposed in this study where vertical and horizontal wells were involved in addition to different production rates. The reservoir was first assumed to be developed with vertical wells only using production rate of (80000–125000) STB/day. The reservoir is also proposed to produce using horizontal wells besides vertical wells with pr
... Show MoreThis study aims to analyze the flow migration of individuals between Iraqi governorates using real anonymized data from Korek Telecom company in Iraq. The purpose of this analysis is to understand the connection structure and the attractiveness of these governorates through examining the flow migration and population densities. Hence, they are classified based on the human migration at a particular period. The mobile phone data of type Call Detailed Records (CDRs) have been observed, which fall in a 6-month period during COVID-19 in the year 2020-2021. So, according to the CDRs nature, the well-known spatiotemporal algorithms: the radiation model and the gravity model were applied to analyze these data, and they are turned out to be comp
... Show MoreA neutron induced deuteron emission spectra and double differential cross-sections (DDX), in 27Al (n, D) 26Mg, 51V (n, D)50Ti , 54Fe ( n, D)53Mn and 63Cu (n, D) 62Ni reactions, have been investigated using the phenomenological approach model of Kalbach. The pre-equilibrium stage of the compound nucleus formation is considered the main pivot in the discription of cross-section, while the equilibrium (pick up or knock out ) process is analyzed in the framework of the statistical theory of cluster reactions, Feshbach, Kerman, and Koonin (FKK) model. To constrain the applicable parameterization as much as possible and to assess the predictive power of these models, the calculated results have been compared with the experimental data and othe
... Show More