Preferred Language
Articles
/
jeasiq-90
Processing of missing values in survey data using Principal Component Analysis and probabilistic Principal Component Analysis methods
...Show More Authors

The idea of ​​carrying out research on incomplete data came from the circumstances of our dear country and the horrors of war, which resulted in the missing of many important data and in all aspects of economic, natural, health, scientific life, etc.,. The reasons for the missing are different, including what is outside the will of the concerned or be the will of the concerned, which is planned for that because of the cost or risk or because of the lack of possibilities for inspection. The missing data in this study were processed using Principal Component  Analysis and self-organizing map methods using simulation. The variables of child health and variables affecting children's health were taken into account: breastfeeding and maternal health. The maternal health variable contained missing value and was processed in Matlab2015a using Methods Principal Component    Analysis and probabilistic Principal Component Analysis of where the missing values ​​were processed and then the methods were compared using the root of the mean error squares. The best method to processed the missing values Was the PCA method.                             

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 02 2018
Journal Name
Journal Of Planner And Development
اثر الثورة الرقمية في التنظيم الفضائي للمحلة السكنية
...Show More Authors

View Publication
Publication Date
Wed Jun 12 2024
Journal Name
مجلة كلية الكوت الجامعة للعلوم الانسانية
التنظيم القانوني للشرط المانع من التأجير (دراسة مقارنة)
...Show More Authors

الشرط المانع من التأجير هو عبارة عن قيد اتفاقي يرد في عقد الإيجار مقتضاه تقييد حرية المستأجر من التصرف في حقه بالإيجار من الباطن أو التنازل عن الإيجار إلا بموافقة المؤجر.وهو بذلك قيد إرادي يرد على حرية المستأجر في التصرف بحقه الناشئ عن عقد الإيجار استثناءً من الأصل العام، وهذا الشرط أما ان يرد على منع المستأجر من التنازل عن الإيجار إلى الغير أو الإيجار إلى الغير من الباطن أو كلا الحالتين، وهو أما أن يظهر بصورة

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 23 2018
Journal Name
Journal Of Planner And Development
اساسيات (التنظيم المكاني –الاجتماعي ) في تخطيط المجمعات السكنية
...Show More Authors

View Publication Preview PDF
Publication Date
Thu Apr 01 2021
Journal Name
Chaos, Solitons & Fractals
Modeling and analysis of an SI1I2R epidemic model with nonlinear incidence and general recovery functions of I1
...Show More Authors

In this paper, we established a mathematical model of an SI1I2R epidemic disease with saturated incidence and general recovery functions of the first disease I1. Considering the basic reproduction number, we obtained conditions for both disease-free and co-existing cases. The equilibrium points local stability is verified by using the Routh-Hurwitz criterion, while for the global stability, we used a suitable Lyapunov function to analyze the endemic spread of the positive equilibrium point. Moreover, we carried out the local bifurcation around both equilibrium points (disease-free and co-existing), where we obtained that the disease-free equilibrium point undergoes a transcritical bifurcation. We conduct numerical simulations that suppo

... Show More
View Publication
Publication Date
Sun Oct 21 2018
Journal Name
Al–bahith Al–a'alami
Islamic Knowledge and its role in the Development of the Culture and Values of the Islamic Community
...Show More Authors

The human perception of science and knowledge is affected by the personal point of view, thus giving it its religious, mental and emotional dimensions to make that perception an effective tool for realizing the truth comprehensively in the delivery of knowledge to the depths of the human soul. The later is composed of multiple factors, which contributes to the human self-development with dimensions beyond the limits of mental logic and the perception of material and emotional situations. That knowledge in the perception of Islamic virtue, which must characterize each Muslim.
Human beings have been striving for knowledge and the understanding of the universe in which they live. For centuries, mankind has acquired knowledge directly an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Processing and re-interpretation of gravity bouguer map of a selected area in the W-NW of Iraq
...Show More Authors
Abstract<p>Geophysical data interpretation is crucial in characterizing the subsurface structure. The Bouguer gravity map analysis of the W-NW region of Iraq serves as the basis for the current geophysical research. The Bouguer gravity data were processed using the Power Spectrum Analysis method. Four depth slices have been acquired after the PSA process, which are: 390 m, 1300 m, 3040 m, and 12600 m depth. The gravity anomaly depth maps show that shallow-depth anomalies are mainly related to the sedimentary cover layers and structures, while the gravity anomaly of the deeper depth slice of 12600 m is more presented to the basement rocks and mantle uplift. The 2D modeling technique was used for </p> ... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 01 2025
Journal Name
مجلة واسط للعلوم الانسانية
A Pragmatic Analysis of Emotional Blackmail in the American Movie No One Would Tell (2018)
...Show More Authors

Emotional blackmail is generally defined as manipulating others' emotions for personal gain. It is a type of manipulation that damages healthy relationships among people and turns them into toxic relations leaving the victim in a state of depression and under stress of losing something s/he holds dear. This study aims to identify the pragmatic techniques of emotional blackmail used by both blackmailers and victims in "No One Would Tell" (2018).  To do so, the researchers developed an eclectic model comprising Forward and Frazier's (1997) emotional blackmail, Searle’s speech acts (1979), Brown and Levinson’s politeness strategies (1987), Culpeper’s impoliteness strategies (1996, 2005), and Mayfield's taxonomy of fallacy (2007)

... Show More
View Publication
Crossref
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Numerical Analysis of Double Diffusive Laminar Natural Convection in a Right Angle Triangular Solar Collector
...Show More Authors

A numerical study of the double-diffusive laminar natural convection in a right triangular solar collector has been investigated in present work. The base (absorber) and glass cover of the collector are isothermal and isoconcentration surfaces, while the vertical wall is considered adiabatic and impermeable. Both aiding and opposing buoyancy forces have been studied. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. Computer code for MATLAB software has been developed and written to solve mathematical model. Results in the form of streamlines, isotherms, isoconcentration, average Nusselt, and average Sherw

... Show More
View Publication Preview PDF