Preferred Language
Articles
/
jeasiq-2351
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 30 2014
Journal Name
International Journal Of Advanced Research In Science, Engineering And Technology
Structural Characteristics and photoconductivity of Cerium doped Zinc Sulfide Nanoparticles synthesized via coprecipitation method
...Show More Authors

ZnS:Ce3+ nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS:Ce3+ quantum dots were zinc acetate (R & M Chemical) as zinc source, thioacetamide as a sulfur source, cerium chloride as cerium source and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS:Ce3+ with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM) also by field effect scanning electron microscopy (FESEM) and XRD. Upon exposure to 460 nm light at zero bias voltage, ZnS:Ce3+/p-Si showed a high sensitivity of 4000% an

... Show More
Publication Date
Fri Mar 04 2022
Journal Name
Environmental Science And Pollution Research
Geographically weighted regression model for physical, social, and economic factors affecting the COVID-19 pandemic spreading
...Show More Authors
Abstract<p>This study aims to analyze the spatial distribution of the epidemic spread and the role of the physical, social, and economic characteristics in this spreading. A geographically weighted regression (GWR) model was built within a GIS environment using infection data monitored by the Iraqi Ministry of Health records for 10 months from March to December 2020. The factors adopted in this model are the size of urban interaction areas and human gatherings, movement level and accessibility, and the volume of public services and facilities that attract people. The results show that it would be possible to deal with each administrative unit in proportion to its circumstances in light of the factors that appe</p> ... Show More
View Publication Preview PDF
Scopus (13)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Fri Apr 15 2016
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Development of Measurement Scale for Hypothesized Conceptual Model of E-service Quality and User Satisfaction Relationship
...Show More Authors

Preview PDF
Publication Date
Sat Mar 01 2025
Journal Name
Geoenergy Science And Engineering
Empirical model for predicting slug-pseudo slug and slug-churn transitions of upward air/water flow
...Show More Authors

A pseudo-slug flow is a type of intermittent flow characterized by short, frothy, chaotic slugs that have a structure velocity lower than the mixture velocity and are not fully formed. It is essential to accurately estimate the transition from conventional slug (SL) flow to pseudo-slug (PSL) flow, and from SL to churn (CH), by precisely predicting the pressure losses. Recent research has showed that PSL and CH flows comprise a significant portion of the conventional flow pattern maps. This is particularly true in wellbores and pipelines with highly deviated large-diameter gas-condensate wellbores and pipelines. Several theoretical and experimental works studied the behavior of PSL and CH flows; however, few models have been suggested to pre

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Nuclear Physics A
Alpha-cluster preformation factor within cluster-formation model for odd-A and odd–odd heavy nuclei
...Show More Authors

View Publication
Scopus (49)
Crossref (47)
Scopus Clarivate Crossref
Publication Date
Fri Apr 24 2020
Journal Name
Modeling Earth Systems And Environment
Assessment of reservoir properties and Buckles model for Rumaila Formation in Ahdeb oil field, Central Iraq
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Corrosion Behavior of Nanocomposite Al-9 wt% Si Alloy Reinforced with Carbon Nanotubes
...Show More Authors

An effort is made to study the effect of composite nanocoating using aluminum-9%wt silicon alloys reinforced with different percentage (0.5,1,2,4)wt.% of carbon nanotubes (CNTs) using  plasma spraying. The effect of this composite on corrosion behavior for AA6061-T6 by extrapolation Tafel test in sea water 3.5wt% NaCl was invested. Many specimens where prepared from AA6061-T6 by the dimension (15x15x3)mm as this first set up and other steps include coating process, X-ray diffraction and SEM examination .The results show the CNTs increase the corrosion rate of the nanocomposite coatings with increasing the weight percentage of CNTs within the Al-Si matrix. Al-9wt%Si coating layer itself has less corrosion rate if compared with both n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More