Preferred Language
Articles
/
jih-884
On The Modified Divergence Information Criterion
...Show More Authors

In this work (paper), we investigate about the robustness of the modified divergence Information Criterion (MDIC), which proposed by Mantalos, Mattheou and Karagrigoriou (2008), to determine the probability of the Criterion picking up the true lag for Autoregressive process, when the error term of this process is normally and Non normally distributed. We obtained the results for different sample sizes by using simulation.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Al-manhaj Library
Multivariate Analysis - Second Edition
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr

... Show More
Preview PDF
Publication Date
Thu Feb 15 2024
Journal Name
Al-manhaj Library
Multivariate Analysis (Second Edition)
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the curr

... Show More
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Nonlinear Second Order Delay Eigenvalue Problems by Least Square Method
...Show More Authors

     The aim of this paper is to study the nonlinear delay second order eigenvalue problems which consists of delay ordinary differential equations, in fact one of the expansion methods that is called the least square method which will be developed to solve this kind of problems.

View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2013
Journal Name
Diyala Journal For Pure Sciences
Multipole Mixing Ratios for Gamma transitions in 56Fe populated in Reaction by using least square fitting method .
...Show More Authors

The γ- mixing ratios of γ- transitions from levels of 56Fe populated in reaction are calculated using least square fitting program for the first time in the case of pure and mixed transitions the results obtained have been compound with γ Values determined by other methods .The comparison shows that the agreement is good this confirmed the valilety of this method in calculating of values for such γ- transitions key word: γ- transition ,Multipole mixing ratios ,Least square fitting method.

Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Chaos-based Color Image Steganography Method Using 3 D Cat Map
...Show More Authors

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Economics And Administrative Sciences
Fuzzy Bridge Regression Model Estimating via Simulation
...Show More Authors

      The main problem when dealing with fuzzy data variables is that it cannot be formed by a model that represents the data through the method of Fuzzy Least Squares Estimator (FLSE) which gives false estimates of the invalidity of the method in the case of the existence of the problem of multicollinearity. To overcome this problem, the Fuzzy Bridge Regression Estimator (FBRE) Method was relied upon to estimate a fuzzy linear regression model by triangular fuzzy numbers. Moreover, the detection of the problem of multicollinearity in the fuzzy data can be done by using Variance Inflation Factor when the inputs variable of the model crisp, output variable, and parameters are fuzzed. The results were compared usin

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 31 2022
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Geological Modeling and Resource Estimation for Mishrif Formation in Nasiriyah Oilfield
...Show More Authors

Resource estimation is an essential part of reservoir evaluation and development planning which highly affects the decision-making process. The available conventional logs for 30 wells in Nasiriyah oilfield were used in this study to model the petrophysical properties of the reservoir and produce a 3D static geological reservoir model that mimics petrophysical properties distribution to estimate the stock tank oil originally in place (STOOIP) for Mishrif reservoir by volumetric method. Computer processed porosity and water saturation and a structural 2D map were utilized to construct the model which was discretized by 537840 grid blocks. These properties were distributed in 3D Space using sequential Gaussian simulation and the variation in

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Performance Improvement of Neural Network Based RLS Channel Estimators in MIMO-OFDM Systems
...Show More Authors

The objective of this study was tointroduce a recursive least squares (RLS) parameter estimatorenhanced by using a neural network (NN) to facilitate the computing of a bit error rate (BER) (error reduction) during channels estimation of a multiple input-multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system over a Rayleigh multipath fading channel.Recursive least square is an efficient approach to neural network training:first, the neural network estimator learns to adapt to the channel variations then it estimates the channel frequency response. Simulation results show that the proposed method has better performance compared to the conventional methods least square (LS) and the original RLS and it is more robust a

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Improving Accuracy in Human Age Classification Using Ensemble Learning Techniques
...Show More Authors

     Age is a predominant parameter for arbitrating an individual, for security and access concerns of the data that exist in cyber space. Nowadays we find a rapid growth in unethical practices from youngsters as well as skilled cyber users. Facial image renders a variety of information that can be used, when processed to ascertain the age of individuals. In this paper, local facial features are considered to predict the age group, where local Binary Pattern (LBP) is extracted from four regions of facial images. The prominent areas where wrinkles are developed naturally in human as age increases are taken for feature extraction. Further these feature vectors are subjected to  ensemble techniques that increases th

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Comparing Weibull Stress – Strength Reliability Bayesian Estimators for Singly Type II Censored Data under Different loss Functions
...Show More Authors

     The stress(Y) – strength(X) model reliability Bayesian estimation which defines life of a component with strength X and stress Y (the component fails if and only if at any time the applied stress is greater than its strength) has been studied, then the reliability; R=P(Y<X), can be considered as a measure of the component performance. In this paper, a Bayesian analysis has been considered for R when the two variables X and Y are independent Weibull random variables with common parameter α in order to study the effect of each of the two different scale parameters β and λ; respectively, using three different [weighted, quadratic and entropy] loss functions under two different prior functions [Gamma and extension of Jeffery

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref