Preferred Language
Articles
/
jeasiq-798
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-steps method depends, in estimation, on (OLS) method, which is sensitive for the existence of abnormality in data or contamination of error; robust methods have been proposed such as LAD & M to strengthen the two-steps method towards the abnormality and contamination of error. In this research imitating experiments have been performed, with verifying the performance of the traditional and robust methods for Local Linear kernel LLPK technique by using two criteria, for different sample sizes and disparity levels.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Simulation of Longitudinal Stability Of Helicopter In Forward Flight
...Show More Authors

The present work describes the development of code for trim and longitudinal stability analysis of a helicopter in forward flight. In general, particular use of these codes can be made for parametric investigation of the effects of the external and internal systems integrated to UH-60 helicopters. A forward flight longitudinal dynamic stability code is also developed in the work to solve the longitudinal part of the whole coupled matrix of equations of motion of a helicopter in forward flight. The coupling is eliminated by linearization. The trim analysis results are used as inputs to the dynamic stability code. The forward flight stability code is applied to UH-60 helicopter.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Inelastic longitudinal electron scattering C42 form factors in42Ti nucleus
...Show More Authors

Inelastic longitudinal electron scattering form factors for second
excited state C42 in 42Ti nucleus have been calculated using shell
model theory. Fp shell model space with configuration (1f7/2 2p3/2
1f5/2 2p1/2) has been adopted in order to distribute the valence
particles (protons and neutrons) outside an inert core 40Ca. Modern
model space effective interactions like FPD6 and GXPF1 have been
used to generate model space vectors and harmonic oscillator wave
function as a single particle wave function. Discarder space (core
orbits + higher orbits) has been included in (core polarization effect)
as a first order correction in microscopic theory to measure the
interested multipole form factors via the model

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Inelastic longitudinal electron scattering C2 form factors in 58Ni
...Show More Authors

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Sep 28 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
A Comparative Study Between the Fragile and Robust Watermarking Techniques and Proposing New Fragile Watermarking with Embedded Value Technique
...Show More Authors

Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Journal Of Economics And Administrative Sciences
"المقدّر الحصين لنموذج تجميعي معمّم شبه معلمي"
...Show More Authors

Generalized Additive Model has been considered as a multivariate smoother that appeared recently in Nonparametric Regression Analysis. Thus, this research is devoted to study the mixed situation, i.e. for the phenomena that changes its behaviour from linear ( with known  functional form) represented in parametric part, to nonlinear (with unknown functional form: here, smoothing spline) represented in nonparametric part of the model. Furthermore,  we propose robust semiparametric GAM estimator, which compared with two other existed techniques.                

 

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Compare Prediction by Autoregressive Integrated Moving Average Model from first order with Exponential Weighted Moving Average
...Show More Authors

The prediction process of time series for some time-related phenomena, in particular, the autoregressive integrated moving average(ARIMA) models is one of the important topics in the theory of time series analysis in the applied statistics. Perhaps its importance lies in the basic stages in analyzing of the structure or modeling and the conditions that must be provided in the stochastic process. This paper deals with two methods of predicting the first was a special case of autoregressive integrated moving average which is ARIMA (0,1,1) if the value of the parameter equal to zero, then it is called Random Walk model, the second was the exponential weighted moving average (EWMA). It was implemented in the data of the monthly traff

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Comparison between RSA and CAST-128 with Adaptive Key for Video Frames Encryption with Highest Average Entropy
...Show More Authors

Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
The Degree of Academic Leaders Practice at the University of Northern Border for Creative Leadership "Empirical Study"
...Show More Authors

The study aimed to identify the degree of academic leaders practices at the University of Northern Border for creative leadership, which attribute to different variables (nature of work, employer, gender, years of experience in administrative work at the university). To achieve the goal of the study, the researcher used the descriptive approach survey. Therefore, the researcher used a questionnaire as a study tool, which consisted of (40) items that included dimensions (sensitivity to problems, initiative, originality, flexibility). The study sample consisted of (240) participants included (agents of colleges, and supporting deanships, and their employees) during the second semester of the academic year 1439/1440 AH. The results showed t

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Determining ACE-2 Level and Some Relevant Biochemical Parameters and studying the effect of Gender in Iraqi Diabetic Patients with Glomeruli and Renal Tubules Fibrosis as Early Prediction Marker
...Show More Authors

     Diabetic kidney disease is an illness of the glomerulus that interferes with the glomerular filtration barrier (GFB), which is worked to enable kidney to selective purification of water and solutes in addition to limiting the movement of large macromolecules such as albumin. In the glomerular endothelium, mesangial cells, foot cells, and the brush border of the proximal tubules, ACE-2 is expressed and that the kidneys represent the highest-expressing region of this enzyme. Thus, the current study aimed to evaluate ACE-2 level in this case compared to healthy condition. The study Conducted with 120 male and female ranging in age (30-65) years old. Ninety patients with type 2 diabetes subdivided into three groups on the basis of A

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (19)
Crossref (17)
Scopus Clarivate Crossref