Preferred Language
Articles
/
jeasiq-798
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-steps method depends, in estimation, on (OLS) method, which is sensitive for the existence of abnormality in data or contamination of error; robust methods have been proposed such as LAD & M to strengthen the two-steps method towards the abnormality and contamination of error. In this research imitating experiments have been performed, with verifying the performance of the traditional and robust methods for Local Linear kernel LLPK technique by using two criteria, for different sample sizes and disparity levels.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Two-Stage Classification of Breast Tumor Biomarkers for Iraqi Women
...Show More Authors

Objective: Breast cancer is regarded as a deadly disease in women causing lots of mortalities. Early diagnosis of breast cancer with appropriate tumor biomarkers may facilitate early treatment of the disease, thus reducing the mortality rate. The purpose of the current study is to improve early diagnosis of breast by proposing a two-stage classification of breast tumor biomarkers fora sample of Iraqi women.

Methods: In this study, a two-stage classification system is proposed and tested with four machine learning classifiers. In the first stage, breast features (demographic, blood and salivary-based attributes) are classified into normal or abnormal cases, while in the second stage the abnormal breast cases are

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Budget Deficiency and Its Treatment Prospects and Policies with Reference to Iraq (2003-2012)
...Show More Authors

Developed and underdevelopment countries, on equal terms, face the problem of budget deficiency. Budget deficiency means that the public expenditure surpasses the public revenues. This, on the international level, is one of the most serious economic problems with many direct effects on the national economy, and depends, basically, on its finance chosen method. Looking for a solution to this problem, for this reason and many other ones, has been highlighted in spite of the many attempts to reduce the role of the governmental expenditure. Budget deficiency can not be attributed to a single unique cause since it is complex phenomenons the causes of which are related to many factors contribute to its occurrence, some of which refer t

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Measuring Positive and Negative Association of Apriori Algorithm with Cosine Correlation Analysis
...Show More Authors

This work aims to see the positive association rules and negative association rules in the Apriori algorithm by using cosine correlation analysis. The default and the modified Association Rule Mining algorithm are implemented against the mushroom database to find out the difference of the results. The experimental results showed that the modified Association Rule Mining algorithm could generate negative association rules. The addition of cosine correlation analysis returns a smaller amount of association rules than the amounts of the default Association Rule Mining algorithm. From the top ten association rules, it can be seen that there are different rules between the default and the modified Apriori algorithm. The difference of the obta

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Feb 20 2005
Journal Name
Baghdad Science Journal
Modification and Study Biological Activity of Chitosan with Compounds Containing Azo Group
...Show More Authors

In the present research synthesis and study of biological activity a series of new polymers modified of chitosan with compounds containing azo group. Beginning diazonium salt produced from 3,3'-dimethyl-[1,1'-biphenyl]-4,4'-diamine reacted with concentrated HCl acid and sodium nitrite. The coupling reaction between diazonium salt with substituted aromatic aldehyde to produce Azo derivatives )1-6(. Azo Schiff bases Chitosan )7-12( were synthesized by condensation of Chitosan with Azo derivatives )1-6( in ethanol with some drops of glacial acetic acid. The structural modifications of Chitosan ring (linked to a bioactive azo moiety) were expected to give new derivatives )7-12( with a diverse range of biological functions. These compounds' st

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon Mar 13 2017
Journal Name
Journal Of Baghdad College Of Dentistry
White Spot Lesions Among Patients Treated With Fixed Orthodontic Appliance at Different Time Intervals
...Show More Authors

ABSTRACT Background:- White spot lesions are common esthetic problem that compromise the success of orthodontic treatment. This study aimed to assess white spot lesions in patients with fixed orthodontic appliance at different time intervals. Materials & Methods:- Thirty two patients (24 females and 8 males) were included in this study and they underwent clinical examination for white spot lesions using enamel decalcification index at four time intervals: (2-3 weeks after appliance insertion, 2, 4 and 6 months). Results:- The patients were free of white spot lesions at the appliance insertion visit. The mean of white spot lesions was 2.22 which were increased significantly during six months to reach 24.59 at the end of study. There was a si

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
International Journal Of Advanced Research
Attenuation Coefficient of Reactive Powder Concrete Using Different Energies.
...Show More Authors

Linear and mass attenuation coefficient of reactive powder concrete (RPC) sample ( of compressive strength equal to 70 Mpa) using beta particles and gamma ray with different energies have been calculated as a function of the absorber thickness and energy. The attenuation coefficient were obtained using NaI(Tl) energy selective scintillation counter with 90Sr/90Y beta source having an energy rang from (0.546-2.274) MeV and gamma ray energies (0.569, 0.662, 1.063, 1.17 and 1.33) MeV . The attenuation coefficient usually depends upon the energy of radiations and nature of the material. The result represented in graphical forms. Exponential decay was observed. It is found that the capability of reactive powder concrete to absorber beta particle

... Show More
Publication Date
Sun Jul 31 2016
Journal Name
International Journal Of Advanced Research
Attenuation Coefficient of Reactive Powder Concrete Using Different Energies.
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Mon Sep 30 2002
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Volumetric Mass Transfer Capacity Coefficient in the RTL Extractor
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref