Preferred Language
Articles
/
jeasiq-933
Robust Estimations of Cluster Analysis: Practical Application in Administrative and Financial Corruption
...Show More Authors

Cluster analysis (clustering) is mainly concerned with dividing a number of data elements into clusters. The paper applies this method to create a gathering of symmetrical government agencies with the aim to classify them and understand how far they are close to each other in terms of administrative and financial corruption by means of five variables representing the prevalent administrative and financial corruption in the state institutions. Cluster analysis has been applied to each of these variables to understand the extent to which these agencies are close to other in each of the cases related to the administrative and financial corruption.           

Outliers and infected data of the well-thought phenomenon have led to inaccurate results that were highlighted by the cluster analysis process made on the infected data. This gave rise to adopt efficient estimation methods known as the Robust Methods, which are used when the deliberate phenomenon-related data is infected due to certain outliers. Thus, this paper is purposed to obtain robust estimations that are functional in determining the robust distances for elimination of outlier and data cleansing by means of certain robust methods the stahel-donoho estimator.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Estimation Multivariate data points in spatial statistics with application
...Show More Authors

This paper  deals  to how to estimate points non measured spatial data when the number of its terms (sample spatial) a few, that are not preferred for the estimation process, because we also know that whenever if the data is large, the estimation results of the points non measured to be better and thus the variance estimate less, so the idea of this paper is how to take advantage of the data other secondary (auxiliary), which have a strong correlation with the primary data (basic) to be estimated single points of non-measured, as well as measuring the variance estimate, has been the use of technique Co-kriging in this field to build predictions spatial estimation process, and then we applied this idea to real data in th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Cluster Analysis Approach to Identify Rock Type in Tertiary Reservoir of Khabaz Oil Field Case Study
...Show More Authors

Rock type identification is very important task in Reservoir characterization in order to constrict robust reservoir models. There are several approaches have been introduced to define the rock type in reservoirs and each approach should relate the geological and petrophysical properties, such that each rock type is proportional to a unique hydraulic flow unit. A hydraulic flow unit is a reservoir zone that is laterally and vertically has similar flow and bedding characteristics. According to effect of rock type in reservoir performance, many empirical and statistical approaches introduced.  In this paper Cluster Analysis technique is used to identify the rock groups in tertiary reservoir for Khabaz oil field by analyses variation o

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Optimizing Blockchain Consensus: Incorporating Trust Value in the Practical Byzantine Fault Tolerance Algorithm with Boneh-Lynn-Shacham Aggregate Signature
...Show More Authors

The consensus algorithm is the core mechanism of blockchain and is used to ensure data consistency among blockchain nodes. The PBFT consensus algorithm is widely used in alliance chains because it is resistant to Byzantine errors. However, the present PBFT (Practical Byzantine Fault Tolerance) still has issues with master node selection that is random and complicated communication. The IBFT consensus technique, which is enhanced, is proposed in this study and is based on node trust value and BLS (Boneh-Lynn-Shacham) aggregate signature. In IBFT, multi-level indicators are used to calculate the trust value of each node, and some nodes are selected to take part in network consensus as a result of this calculation. The master node is chosen

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
Comparative Analysis of H2 and H∞ Robust Control Design Approaches for Dynamic Control Systems
...Show More Authors

This paper discusses using H2 and H∞ robust control approaches for designing control systems. These approaches are applied to elementary control system designs, and their respective implementation and pros and cons are introduced. The H∞ control synthesis mainly enforces closed-loop stability, covering some physical constraints and limitations. While noise rejection and disturbance attenuation are more naturally expressed in performance optimization, which can represent the H2 control synthesis problem. The paper also applies these two methodologies to multi-plant systems to study the stability and performance of the designed controllers. Simulation results show that the H2 controller tracks a desirable cl

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Alustath Journal For Human And Social Sciences
Obstacles to the application of electronic management in university libraries: the universities of Baghdad and Al-Mustansiriya as a model.
...Show More Authors

The research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr

... Show More
Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Geological Journal
Permeability Prediction and Facies Distribution for Yamama Reservoir in Faihaa Oil Field: Role of Machine Learning and Cluster Analysis Approach
...Show More Authors

Empirical and statistical methodologies have been established to acquire accurate permeability identification and reservoir characterization, based on the rock type and reservoir performance. The identification of rock facies is usually done by either using core analysis to visually interpret lithofacies or indirectly based on well-log data. The use of well-log data for traditional facies prediction is characterized by uncertainties and can be time-consuming, particularly when working with large datasets. Thus, Machine Learning can be used to predict patterns more efficiently when applied to large data. Taking into account the electrofacies distribution, this work was conducted to predict permeability for the four wells, FH1, FH2, F

... Show More
View Publication
Scopus (7)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The Linguistic Analysis of Deduction in The Holy Qur’an: Surat Ghafir as a Model
...Show More Authors

This paper aims at discovering the real implication of deduction in the Arabic culture
with concentration on its applications in Arabic grammar, logic, and fundamentals of Islamic
legislations. Some light has been shed on deduction in the Arabic culture but most of recent
works did not analyze deduction according to the pragmatic analysis. This paper will answer
the following questions:
 to what extent deduction in Arabic grammar could comprehend with deduction l logic and
fundamentals of thinking in Islamic thought?
 how can we find the deduction thinking in the Qur’anic surah if Ghafir?
 Can we find parts of deduction in the surah?
The methodology in this paper is descriptive analytical. This metho

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of Planner And Development
The Quantitative Analysis To Assess The Efficiency Of The Transport Network In Sader City
...Show More Authors

     This research examines the quantitative analysis to assess the efficiency of the transport network in Sadr City, where the study area suffers from a large traffic movement  for the variability of traffic flow and intensity at peak hours as a result of inside traffic and outside of it, especially in the neighborhoods of population with  economic concentration.                                                           &n

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Semi parametric Estimators for Quantile Model via LASSO and SCAD with Missing Data
...Show More Authors

In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 15 2023
Journal Name
Journal Of Economics And Administrative Sciences
Relationship Analysis Between Monetary Policy and Financial Sustainability in Iraq For the Period 2015–2021
...Show More Authors

This research aims to study and analyze the reality of monetary policy and financial sustainability in Iraq through either a descriptive or analytical approach by trying to link and coordinate between monetary policy and fiscal policy to enhance economic sustainability. The research is based on the hypothesis that the monetary policy of Iraq contributes to achieving financial stability, which improves economic sustainability by providing aid and assistance to the state to reduce the budget deficit and exacerbate indebtedness. The author used the monetary policy indicators, the re-deduction of Treasury transfers by the central bank and the money supply, and financial sustainability indicators, including the public debt indicators and the

... Show More
View Publication Preview PDF
Crossref