Preferred Language
Articles
/
jeasiq-798
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-steps method depends, in estimation, on (OLS) method, which is sensitive for the existence of abnormality in data or contamination of error; robust methods have been proposed such as LAD & M to strengthen the two-steps method towards the abnormality and contamination of error. In this research imitating experiments have been performed, with verifying the performance of the traditional and robust methods for Local Linear kernel LLPK technique by using two criteria, for different sample sizes and disparity levels.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Wireless Propagation Multipaths using Spectral Clustering and Three-Constraint Affinity Matrix Spectral Clustering
...Show More Authors

This study focused on spectral clustering (SC) and three-constraint affinity matrix spectral clustering (3CAM-SC) to determine the number of clusters and the membership of the clusters of the COST 2100 channel model (C2CM) multipath dataset simultaneously. Various multipath clustering approaches solve only the number of clusters without taking into consideration the membership of clusters. The problem of giving only the number of clusters is that there is no assurance that the membership of the multipath clusters is accurate even though the number of clusters is correct. SC and 3CAM-SC aimed to solve this problem by determining the membership of the clusters. The cluster and the cluster count were then computed through the cluster-wise J

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri May 16 2014
Journal Name
International Journal Of Computer Applications
Design and Implementation of Real Time Face Recognition System (RTFRS)
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Building a mathematical model for measuring and analyzing the general equilibrium in the Iraqi economy through the IS-lm-BP model
...Show More Authors

In order to achieve overall balance in the economy to be achieved in different markets and at one time (market commodity, monetary and labor market and the balance of payments and public budget), did not provide yet a model from which to determine the overall balance in the economy and the difficulty of finding the inter-relationship between all these markets and put them applied in the form of allowing the identification of balance in all markets at once.

One of the best models that have dealt with this subject is a model
(LM-BP-IS), who teaches balance in the commodity market and money market and balance of payments and the importance of this issue This research tries to shed light on the reality

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 23 2019
Journal Name
The International Journal Of Artificial Organs
Real-time classification of shoulder girdle motions for multifunctional prosthetic hand control: A preliminary study
...Show More Authors

In every country in the world, there are a number of amputees who have been exposed to some accidents that led to the loss of their upper limbs. The aim of this study is to suggest a system for real-time classification of five classes of shoulder girdle motions for high-level upper limb amputees using a pattern recognition system. In the suggested system, the wavelet transform was utilized for feature extraction, and the extreme learning machine was used as a classifier. The system was tested on four intact-limbed subjects and one amputee, with eight channels involving five electromyography channels and three-axis accelerometer sensor. The study shows that the suggested pattern recognition system has the ability to classify the sho

... Show More
View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 12 2019
Journal Name
Lubricants
Absorption Wavebands for Discriminating Oxidation Time of Engine Oil as Detected by FT-IR Spectroscopy
...Show More Authors

Fourier Transform-Infrared (FT-IR) spectroscopy was used to analyze gasoline engine oil (SAE 5W20) samples that were exposed to seven different oxidation times (0 h, 24 h, 48 h, 72 h, 96 h, 120 h, and 144 h) to determine the best wavenumbers and wavenumber ranges for the discrimination of the oxidation times. The thermal oxidation process generated oil samples with varying total base number (TBN) levels. Each wavenumber (400–3900 cm−1) and wavenumber ranges identified from the literature and this study were statistically analyzed to determine which wavenumbers and wavenumber ranges could discriminate among all oxidation times. Linear regression was used with the best wavenumbers and wavenumber ranges to predict oxidation time.

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
DeepFake Detection Improvement for Images Based on a Proposed Method for Local Binary Pattern of the Multiple-Channel Color Space
...Show More Authors

DeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jul 07 2011
Journal Name
Arabian Journal Of Geosciences
Mineralogy, geochemistry, and reserve estimation of the Euphrates limestone for Portland cement industry at Al-Najaf area, South Iraq
...Show More Authors

View Publication
Scopus (23)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Engineering Analysis With Boundary Elements
Numerical solution of two-dimensional mixed problems with variable coefficients by the boundary-domain integral and integro-differential equation methods
...Show More Authors

View Publication
Crossref (9)
Crossref