Preferred Language
Articles
/
jeasiq-86
Using simulation to compare between parametric and nonparametric transfer function model
...Show More Authors

In this paper, The transfer function model in the time series was estimated using different methods, including parametric Represented by the method of the Conditional Likelihood Function, as well as the use of abilities nonparametric are in two methods  local linear regression and cubic smoothing spline method, This research aims to compare those capabilities with the nonlinear transfer function model by using the style of simulation and the study of two models as output variable and one model as input variable in addition to generating random error in the model of the transfer function model that follows the ARMA model by two functions and a variation (0.5) at sample sizes (n = 100,150,200) The results showed the superiority of the nonparametric transfer function model at the cubic smoothing spline estimator C.S.S On the nonlinear and nonparametric transfer function model.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
2013 Ieee International Conference On Circuits And Systems (iccas)
Improved undetected error probability model for JTEC and JTEC-SQED coding schemes
...Show More Authors

The undetected error probability is an important measure to assess the communication reliability provided by any error coding scheme. Two error coding schemes namely, Joint crosstalk avoidance and Triple Error Correction (JTEC) and JTEC with Simultaneous Quadruple Error Detection (JTEC-SQED), provide both crosstalk reduction and multi-bit error correction/detection features. The available undetected error probability model yields an upper bound value which does not give accurate estimation on the reliability provided. This paper presents an improved mathematical model to estimate the undetected error probability of these two joint coding schemes. According to the decoding algorithm the errors are classified into patterns and their decoding

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Oct 06 2022
Journal Name
Advances In Systems Science And Applications
Stability and Bifurcation of a Delay Cancer Model in the Polluted Environment
...Show More Authors

It is well known that the spread of cancer or tumor growth increases in polluted environments. In this paper, the dynamic behavior of the cancer model in the polluted environment is studied taking into consideration the delay in clearance of the environment from their contamination. The set of differential equations that simulates this epidemic model is formulated. The existence, uniqueness, and the bound of the solution are discussed. The local and global stability conditions of disease-free and endemic equilibrium points are investigated. The occurrence of the Hopf bifurcation around the endemic equilibrium point is proved. The stability and direction of the periodic dynamics are studied. Finally, the paper is ended with a numerical simul

... Show More
View Publication
Scopus (2)
Scopus
Publication Date
Tue Jun 01 2021
Journal Name
Political Sciences Journal
The European Union and the Extremist Right Phenomenon: Brexit as a Model
...Show More Authors

The European Unit has never been affected by a serious phenomena as the phenomena of the advancing of the far right parties. Though these parties vary in their impact in their original countries, they agree on one important issue which is the deconstruction of the European unit and limiting its supernational powers. These increasing popular parties aim at more national independence in decision making away from the decisions taken by Brussels. Moreover, they criticize the financial and administrative corruption accompanied many of the rescuing procedures directed for example towards countries like Greece and Spain during the international economic crisis. This failure nourishes many of the negative feelings against the European unit which

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Applications And Applied Mathematics: An International Journal (aam)
Stability and Bifurcation of a Cholera Epidemic Model with Saturated Recovery Rate
...Show More Authors

In this paper, a Cholera epidemic model is proposed and studied analytically as well as numerically. It is assumed that the disease is transmitted by contact with Vibrio cholerae and infected person according to dose-response function. However, the saturated treatment function is used to describe the recovery process. Moreover, the vaccine against the disease is assumed to be utterly ineffective. The existence, uniqueness and boundedness of the solution of the proposed model are discussed. All possible equilibrium points and the basic reproduction number are determined. The local stability and persistence conditions are established. Lyapunov method and the second additive compound matrix are used to study the global stability of the system.

... Show More
View Publication
Publication Date
Wed Oct 09 2019
Journal Name
Journal Of The College Of Education For Women
Naber and toning in the modern Arab poetry Mahmoud Darwish, a model
...Show More Authors

Naber and toning in the modern Arab poetry Mahmoud Darwish, a model

View Publication Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
2016 3rd International Conference On Computer And Information Sciences (iccoins)
Measurement model of e-SQ dimensions and users' satisfaction in Malaysia IHL
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Alexandria Engineering Journal
Impact of dust storms on plant biomass: Model structure and dynamic study
...Show More Authors

View Publication
Scopus (3)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Agricultural And Statistical Sciences
A COMPARISON BETWEEN SOME HIERARCHICAL CLUSTERING TECHNIQUES
...Show More Authors

In this paper, some commonly used hierarchical cluster techniques have been compared. A comparison was made between the agglomerative hierarchical clustering technique and the k-means technique, which includes the k-mean technique, the variant K-means technique, and the bisecting K-means, although the hierarchical cluster technique is considered to be one of the best clustering methods. It has a limited usage due to the time complexity. The results, which are calculated based on the analysis of the characteristics of the cluster algorithms and the nature of the data, showed that the bisecting K-means technique is the best compared to the rest of the other methods used.

Preview PDF
Scopus (1)
Scopus
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Semantic differences between the vocabulary of Quran
...Show More Authors

Ceremony of the Koran vocabulary animate different connotations unique style patch on
smth not any method of Arabs, has been used used vocabulary and special Madza, he put
every single in place of installation so that if you do not put in place misfire meaning and
became Rkika method. Our goal in this research study a range of vocabulary in terms of the
implications and documenting the trial of the Hadith and sayings of the beneficiaries of Arab
scholars have different attitudes, linguists and interpreters and speakers and fundamentalists,
philosophers, and others.

View Publication Preview PDF