Preferred Language
Articles
/
jih-447
Estimate AR(3) by Using Levinson-Durbin Recurrence & Weighted Least Squares Error Methods
...Show More Authors

In this study, we investigate about the estimation improvement for Autoregressive model of the third order, by using Levinson-Durbin Recurrence (LDR) and Weighted Least Squares Error ( WLSE ).By generating time series from AR(3) model when the error term for AR(3) is normally and Non normally distributed and when the error term has ARCH(q) model with order q=1,2.We used different samples sizes and the results are obtained by using simulation. In general, we concluded that the estimation improvement for Autoregressive model for both estimation methods (LDR&WLSE), would be by increasing sample size, for all distributions which are considered for the error term , except the lognormal distribution. Also we see that the estimation improvement for WSLE method, depends on the value for the Forgetting Factor parameter (α),which haave value less than one(i.e. 1) ( α< ). The estimate is improved for large value for parameterα exactly at 0.99 α= .Finally, we used the estimation methods (LDR&WLSE) for real data.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Prediction in One of Iraqi Carbonate Reservoir Using Statistical, Hydraulic Flow Units, and ANN Methods
...Show More Authors

   Permeability is an essential parameter in reservoir characterization because it is determined hydrocarbon flow patterns and volume, for this reason, the need for accurate and inexpensive methods for predicting permeability is important. Predictive models of permeability become more attractive as a result.

   A Mishrif reservoir in Iraq's southeast has been chosen, and the study is based on data from four wells that penetrate the Mishrif formation. This study discusses some methods for predicting permeability. The conventional method of developing a link between permeability and porosity is one of the strategies. The second technique uses flow units and a flow zone indicator (FZI) to predict the permeability of a rock mass u

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 01 2019
Journal Name
Iop Conf. Series: Materials Science And Engineering
Fire flame effect on the compressive strength of reactive powder concrete using different methods of cooling
...Show More Authors

This research foxed on the effect of fire flame of different burning temperatures (300, 400 and 500)oC on the compressive strength of reactive powder concrete (RPC).The steady state duration of the burning test was (60)min. Local consuming material were used to mixed a RPC of compressive strength around (100) MPa. The tested specimens were reinforced by (3.0) cm hooked end steel fiber of (1100) MPa yield strength. Three steel fiber volume fraction were adopted in this study (0, 1.0and 1.5)% and two cooling process were included, gradual and sudden. It was concluding that increasing burning temperature decreases the residual compressive strength for RPC specimens of(0%) steel fiber volume fraction by (12.16, 19.46&24.49) and (18.20, 27.77 &3

... Show More
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Wrapper and Hybrid Feature Selection Methods Using Metaheuristic Algorithms for English Text Classification: A Systematic Review
...Show More Authors

Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall

... Show More
View Publication Preview PDF
Scopus (43)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Image Steganography by Using Multiwavelet Transform
...Show More Authors

Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 15 2025
Journal Name
Journal Of Engineering
Drag Reduction by using Anionic Surfactants
...Show More Authors

View Publication
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Texts Ciphering by using Translation Principle
...Show More Authors

The proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.

View Publication Preview PDF
Publication Date
Thu Apr 18 2019
Journal Name
Al-kindy College Medical Journal
Demonstration of the value of diffusion weighted MR imaging for differentiation of benign from malignant breast lesions
...Show More Authors

Background: Radiologic evaluation of breast lesions is being achieved through several imaging modalities. Mammography has an established role in breast cancer screening and diagnosis. Still however, it shows some limitations particulary in dense breast.

Methods : Magnetic resonance imaging is an attractive tool for the diagnosis of breast tumors1 and the use of magnetic resonance imaging of the breast is rapidly increasing as this technique becomes more widely available.1 As an adjunct to mammography and ultrasound, MRI can be a valuable addition to the work-up of a breast abnormality. MRI has the advantages of providing a three-dimensional view of the breast, performing wit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Scripta Medica
The value of dynamic contrast-enhanced MRI and diffusion-weighted sequence in the evaluation of endometrial lesions
...Show More Authors

Background/Aim: Endometrial abnormalities represent a diagnostic challenge due to overlapping imaging features with normal endometrium. Aim of this study was to assess accuracy of dynamic contrast-enhanced and diffusion-weighted magnetic resonance imaging (MRI) in evaluation of endometrial lesions in comparison with T2 and to assess local staging validity and degree of myometrial invasion in malignancy. Methods: Forty patients with abnormal vaginal bleeding or sonographic thickened endometrial were recruited. MRI examination of pelvis was per-formed using 1.5 T scanner with a pelvic array coil. Conventional T1-and T2, dynamic contrast-enhanced (DCE) sequences and diffusion-weighted image (DWI) were performed. Results: Mean age of pa

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
J. Of University Of Anbar For Pure Science
Synthesis, spectral Characterization and studies of Some Divalent Metal Ion Complexes with Ligand of [3-(1H-indol- 3-yl)-2-(3-(4-methoxybenzoyl)thiouereido)propanoic acid] (MTP
...Show More Authors

In this work, prepared new ligand[3- (1H-indol-3-yl) -2- (3-(4- methoxybenzoyl)thiouereido) propanoic acid](MTP) has been synthesized by reaction of 4-Methoxybenzoyl isothiocyanate with tryptophane(1:1), The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13C NMR spectra, Some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MTP)2] (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg), the proposed geometrical structure for all complexes were tetrahedral except copper complex has a square planer geometry around metallic ion

... Show More