Preferred Language
Articles
/
jeasiq-595
A comparison of the Semiparametric Estimators model smoothing methods different using
...Show More Authors

In this paper, we made comparison among different parametric ,nonparametric and semiparametric estimators for partial linear regression model users parametric represented by ols and nonparametric methods represented by cubic smoothing spline estimator and Nadaraya-Watson estimator, we study three nonparametric regression models and samples sizes  n=40,60,100,variances used σ2=0.5,1,1.5 the results  for the first model show that N.W estimator for partial linear regression model(PLM) is the best followed the cubic smoothing spline estimator for (PLM),and the results of the second and the third model show that the best estimator is C.S.S.followed by N.W estimator for (PLM) ,the results also indicated that the lowest estimator and representation of the models used is the parametric estimator  OLS followed by nanparametric estimator N.W.

  

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 26 2022
Journal Name
Iraqi Journal Of Science
A Mathematical Model for Iraqi Airways Company about Evaluating Its Objectives and Strategies
...Show More Authors

In this paper, we introduced a mathematical model for Iraqi Airways Company about evaluating its objectives and strategies. First, we studied Iraqi Airways schedules with different departure cities for each airline path. Then, we applied some fuzzy integrals for determining the best airline path.

View Publication Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (71)
Crossref (63)
Scopus Clarivate Crossref
Publication Date
Sat Jun 04 2022
Journal Name
Al–bahith Al–a'alami
paratexte in specialized literary journals : AL ADEEB AL IRAQI magazine is a model
...Show More Authors

Post-structural critical studies highlighted the importance of studying the texts surrounding the text as an important part in the process of receiving and understanding texts, and although this topic was dealt with by the ancient Arabs and Europeans, interest in it appeared clearly after the appearance of Gerard Genet's book (SEUILS), which separated it Text Thresholds. Or what he called paratexte, and dealt with them with interest as he reads them on books. With the development of semiotic studies, interest in paratexte studies began in a broader way and in various literary and non-literary texts, including journalistic texts. And since specialized magazines are one of the press releases that enjoy their privacy in terms of topics and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jun 03 2020
Journal Name
Journal Of Applied Mathematics
Order and Chaos in a Prey-Predator Model Incorporating Refuge, Disease, and Harvesting
...Show More Authors

In this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Biological Effect of Different Concentrations of Bacillus Thurngensis Isolated From The Soils of Sawa Lake, Al Muthanna Governorate on The of Hypera postica at Different Time Periods
...Show More Authors
Abstract<p>This study conduct in Al-Muthanna governorate to assess five concentrations of <italic>Bacillus</italic> thurngensisagonist <italic>Hyperapostica</italic>. The results showed the presence of <italic>Bacillus thurngensisin</italic> all the studied sites of Lake Sawa in Muthanna Governorate, and the rates of its presence were close to the same sites, and the rate of its presence in those sites was 35%, and its highest rate was recorded in the north and east of the lake, as it reached 40% and the lowest amounted to 30% in the two sites south and west site. The results of the study showed that five concentrations were taken from bacterial isolates of <it></it></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Comparison of ََQuality of Life and Treatment Satisfaction among Sample of Iraqi Patients Using Anticoagulant Therapy (Warfarin or Non-Vitamin K Antagonist Oral Anticoagulants)
...Show More Authors

Background: Oral anticoagulation medication, warfarin and non-vitamin k antagonist oral anticoagulants  (NOAC) may require long term use which may affect patients’ satisfaction with their treatment and their quality of life (QOL). Objective: To compare the quality of life and treatment satisfaction among groups of patients using different anticoagulant therapies (warfarin and NOAC). Patients and methods: A cross-sectional study was performed at Ibn Al-Bitar Hospital for cardiac surgery in Baghdad in the period between December 2022 to May 2023. The study population included a convenient sample of patients receiving either warfarin or non-vitamin k antagonist oral anticoagulants treatment. The Arabic version of the short form 12

... Show More
View Publication
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Al-academy
Aesthetic Levels in Shape Variables in Spectacular Films the Indian Film (Main Tera Hero) a Model: غسان محسن حمد
...Show More Authors

The spectacular film is a type of feature films which has specific elements that contribute in increasing the aesthetics of the shape in its structure. The researcher started studying this type of films by researching the spectacular film concept, the history of its development, who are its most important stars and then tackling the Indian cinema represented by Bollywood, which is considered a school for this type of film. The researcher addressed the most important influential elements that entre in its production as well as studying these elements that contribute to building the shape including the configuration, movements of cameras, lenses, the lighting, colors, costumes etc. and what influence they have in forming a special aestheti

... Show More
View Publication Preview PDF
Crossref