Preferred Language
Articles
/
jeasiq-32
discriminate analysis and logistic regression by use partial least square
...Show More Authors

Abstract

   The method binery logistic regression and linear discrimint function of the most important statistical methods used in the classification and prediction when the data of the kind of binery (0,1) you can not use the normal regression therefore resort to binary logistic regression and linear discriminant function in the case of two group in the case of a Multicollinearity problem between the data (the data containing high correlation) It became not possible to use binary logistic regression and linear discriminant function, to solve this problem, we resort to Partial least square regression.

In this, search the comparison between binary logistic regression and linear discriminant function using error Category. Where the data has been generating a variable response (Y) binery data (0,1) containing Multicollinearity problem by the samples (50-100-150-250-400) and the variables (5-10-15). Multicollinearity problem has been processed using a method partial least square The research found that linear discriminant function It is the best in the classification of data from binary logistic regression classified as linear discriminant function the data correctly and more accurate than binary logistic regression

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 07 2014
Journal Name
Baghdad Science Journal
Corrosion Behavior of Copper and Carbon Steel in Acidic Media
...Show More Authors

The corrosion behavior of copper and carbon steel in 1M concentration of hydrochloric acid (HCl) and sulphuric acid (H2SO4) has been studied. The corrosion inhibition of copper and carbon steel in 1M concentration of hydrochloric acid (HCl) and sulphuric acid (H2SO4) by Ciprofloxacin has been investigated. Specimens were exposed in the acidic media for 7 hours and corrosion rates evaluated by using the weight loss method. The effect of temperature (from 283 ºK to 333 ºK), pH (from 1to 6), inhibitor concentration (10-4 to 10-2) has been studied. It was observed that sulphuric acid environment was most corrosive to the metals because of its oxidizing nature, followed by hydrochloric acid. The rate of metal dissolution increased with incre

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Modeling and Control of Fuel Cell Using Artificial Neural Networks
...Show More Authors

This paper includes an experimental study of hydrogen mass flow rate and inlet hydrogen pressure effect on the fuel cell performance. Depending on the experimental results, a model of fuel cell based on artificial neural networks is proposed. A back propagation learning rule with the log-sigmoid activation function is adopted to construct neural networks model. Experimental data resulting from 36 fuel cell tests are used as a learning data. The hydrogen mass flow rate, applied load and inlet hydrogen pressure are inputs to fuel cell model, while the current and voltage are outputs. Proposed model could successfully predict the fuel cell performance in good agreement with actual data. This work is extended to developed fuel cell feedback

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 27 2019
Journal Name
Iraqi Journal Of Science
Enhanced Cartooning System Based on Dynamic Augmented KMCG and LIP
...Show More Authors

The Non-Photorealistic Rendering (NPR) demands are increased with the development of electronic devices. This paper presents a new model for a cartooning system, as an essential category of the NPR. It is used the concept of vector quantization and Logarithmic Image Processing (LIP). An enhancement of Kekre Median Codebook Generation (KMCG) algorithm has been proposed and used by the system. Several metrics utilized to evaluate the time and quality of the system. The results showed that the proposed system reduced the time of cartoon production. Additionally, it enhanced the quality of several aspects like smoothing, color reduction, and brightness.

View Publication Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Educational And Psychological Researches
Personal Efficacy And Its Relationship With Mindfulness Among University Students
...Show More Authors

The study seeks to examine the level of personal efficacy and its relation to mental alertness among university students. Besides, the statistically significant differences in regard of students' gender, and the correlation between male and female. To do this, the researcher adopted two scales: one to measure the personal efficacy which was made up by (abed al-jabaar, 2010) included (26) items, and the other to measure the mental alertness that designed by (abed Allah, 2012) included (36) items. A total of (120) student were selected randomly from three-different colleges at the Al-Mustansiriyah University for the academic year 2016-2017. The findings revealed there are no significant differences among students in regard of the personal

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2013
Journal Name
Al-kindy College Medical Journal
HLA Typing in Iraqi Patients with Obesity and Primary Osteoarthritis.
...Show More Authors

Background: Osteoarthritis (OA) is a degenerative joint disease. It is one of the major causes of disability in developed and developing countries. Human leukocyte antigen (HLA) as part of immune system has a role in the disease process.Objectives: To investigate whether there is an association between HLA class II-DRB and OA.Methods: A case control study with 26 patients with osteoarthritis and 22 apparently healthy obese control persons matching in ethnicity were enrolled in this study during the period between October 2012 till March 2013. Direct interview was done with each patient and HLA typing was done by molecular method using Sequence Specific Primer (PCR-SSP) method using One Lambda Kit-USA. Results: The results showed that fem

... Show More
View Publication Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 09 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Infants’ Obesity and Overweight in Relation to Type of Feeding
...Show More Authors

Abstract Objective (s): To identify the prevalence of obesity and overweight in infants and children less than 2 years of age and its relationship with type of feeding in a sample of children attending Al- Kadhymia primary health care center. Methodology: This study was a descriptive survey carried out in, the primary health care centre of Al-Kadhymia town in Baghdad during the period from 5th of July 2009-1st of May 2010. Sample was chosen by non probability convenience sampling and it included 744 infant and children. Data were gathered by a combination of a structured questionnaire and measurements o

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Qin Seal Script Character Recognition with Fuzzy and Incomplete Information
...Show More Authors

The dependable and efficient identification of Qin seal script characters is pivotal in the discovery, preservation, and inheritance of the distinctive cultural values embodied by these artifacts. This paper uses image histograms of oriented gradients (HOG) features and an SVM model to discuss a character recognition model for identifying partial and blurred Qin seal script characters. The model achieves accurate recognition on a small, imbalanced dataset. Firstly, a dataset of Qin seal script image samples is established, and Gaussian filtering is employed to remove image noise. Subsequently, the gamma transformation algorithm adjusts the image brightness and enhances the contrast between font structures and image backgrounds. After a s

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Hypothyroidism and AMH in Iraqi Patients with Chronic Kidney Disease
...Show More Authors

This study was conducted to investigate thyroid function and Anti-Müllerian hormone (AMH) in (Chronic kidney disease) CKD patients by evaluating their levels in CKD patients, 50 patients were diagnosed to have CKD stage-5, their ages ranged between 20-50 years (25 males and 25 females) who attended the Nephrology and Transplant Center in Medical City of Baghdad- Iraq, they were recruited from April 2018 to July 2018 and were enrolled into the study. The control group consisted of 20 healthy individuals, their ages ranged between 20-48 years (10 males and 10 females). The study showed non-significant (p>0.05) increase in AMH level in CKD patients compared to the control group. On the other hand, TSH was recorded a highly significant (

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref