Preferred Language
Articles
/
jperc-1019
Comparison between Rush Model Parameters to Completed and Lost Data by Different Methods of Processing Missing Data
...Show More Authors

The current study aims to compare between the assessments of the Rush model’s parameters to the missing and completed data in various ways of processing the missing data. To achieve the aim of the present study, the researcher followed the following steps: preparing Philip Carter test for the spatial capacity which consists of (20) items on a group of (250) sixth scientific stage students in the directorates of Baghdad Education at Al–Rusafa (1st, 2nd and 3rd) for the academic year (2018-2019). Then, the researcher relied on a single-parameter model to analyze the data. The researcher used Bilog-mg3 model to check the hypotheses, data and match them with the model. In addition, the researcher relied on chi-squared value for each item at (0.05).  After that, the researcher found out the parameters of the missing data after relying on a loss percentage (10%) and used three ways to treat them (mean, regression, likelihood). The results showed that the comparison between the parameters completed and missing data by using three ways of processing the missing data is in favor of the parameters of the completed data, and the likelihood way is the suitable way to treat the completed data. 

     The conclusions, recommendations and suggestions have been drawn based on the findings.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
PHARAOH'S CHARACTER BETWEEN THE QUR'ANIC TEXT AND THE ARABIC NOVEL: (Naguib Mahfouz's Pharaonic Novels as a Model)
...Show More Authors

The Character is one of the elements of Storytelling, as it is the center of the plot, making it the basis on which the talk is about. The talk is the portrayal of the character while they’re acting; the novelist presents the character by interacting with the events, and the extent of the negative and positive appearing impact on the character. It should be noted that everyone has two personalities or more, each one appearing in a different position or situation. For instance, a man can be a father, a lover, an employee, a son or anyone else .. in another position, he might be a master, and in another a looser begging for the mercy of his humiliator, and sometimes he can show weakness to the one he loves, or show strength to his enemie

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparison of Two Conventional Methods for Identification of Dermatophyte Fungi
...Show More Authors

The current study is the identification and isolation dermatophyte species in clinical isolates by both Sabouraud’s Dextrose Agar (SDA) and on Dermatophyte Test Medium (DTM). Clinical specimens of hair, nails and skin scales were collected from patients with dermatophytosis and submitted to direct microscopic examination after immersion in 20% of potassium hydroxide solution. The clinical specimens were cultured on SDA containing chloramphenicol and cycloheximide, and on DTM. Tinea corporis showed the highest prevalent dermatophyte infection among patients (26.7%), followed by Tinea pedis (23.3%), whereas Tinea manuum exhibited the lowest fungal infection (6.7 %). Rural areas revealed the highest prevalence of dermatophyte in

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Nov 22 2014
Journal Name
Indian Journal Of Physics
Comparison between shell model and self-consistent mean field calculations for ground charge density distributions and elastic form factors of 12C and 16O nuclei
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Science And Research
Comparison of Bacterial Contamination between I Phone and Galaxy Devices
...Show More Authors

Ninety eight mobile samples, (54) galaxy phone and (44) I phone, were swabbed for bacterial culture determination by culturing on MacConky agar , Blood agar , Mannitol salt agar , Muller Hinton agar .Staphylococcuswas the highest frequent isolated bacteria from Galaxy phone (33%) and I phone (37%). This study revealed that galaxy phone appears less contaminated with bacteria, the ratio of non-contaminated devices is (44%) when compared with I phone (9%). Sensitivity test showed that Ogmintin have the lowest effect on Staphylococcusisolated from both type of devices while cefitriaxone have the highest effect. DNA of isolate from galaxy 31 that exhibit highest resistance against antibiotics was extracted and 16S rRNA gene was polymerized by P

... Show More
Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Biochemical And Cellular Archives
COMPARISON OF PERI-IMPLANT MICROBIOTA BETWEEN HEALTHY AND DISEASED IMPLANTS
...Show More Authors

Recently, dental implants have experienced increasing demand as one of the most effective, permanent and stable ways for replacing missing teeth. However, peri-implant diseases that are multispecies plaque-based infections may ultimately lead to implant failure (i.e., late peri-implantitis). Therefore, the present study aims to detect the microbial diversity of subgingival plaque in peri-implantitis cases (N = 30) by comparing with healthy implants (N = 34) using culture-based identification methods, including VITEK 2 system. An increase in microbial diversity (29 species along with 1 and 7 isolates, which were classified as a genus and unidentified species, respectively) were observed in subgingival sites of diseased implants dominated by

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Secure Big Data Transmission based on Modified Reverse Encryption and Genetic Algorithm
...Show More Authors

      The modern systems that have been based upon the hash function are more suitable compared to the conventional systems; however, the complicated algorithms for the generation of the invertible functions have a high level of time consumption. With the use of the GAs, the key strength is enhanced, which results in ultimately making the entire algorithm sufficient. Initially, the process of the key generation is performed by using the results of n-queen problem that is solved by the genetic algorithm, with the use of a random number generator and through the application of the GA operations. Ultimately, the encryption of the data is performed with the use of the Modified Reverse Encryption Algorithm (MREA). It was noticed that the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Aug 31 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
FDPHI: Fast Deep Packet Header Inspection for Data Traffic Classification and Management
...Show More Authors

Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c

... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Complexity
Bayesian Regularized Neural Network Model Development for Predicting Daily Rainfall from Sea Level Pressure Data: Investigation on Solving Complex Hydrology Problem
...Show More Authors

Prediction of daily rainfall is important for flood forecasting, reservoir operation, and many other hydrological applications. The artificial intelligence (AI) algorithm is generally used for stochastic forecasting rainfall which is not capable to simulate unseen extreme rainfall events which become common due to climate change. A new model is developed in this study for prediction of daily rainfall for different lead times based on sea level pressure (SLP) which is physically related to rainfall on land and thus able to predict unseen rainfall events. Daily rainfall of east coast of Peninsular Malaysia (PM) was predicted using SLP data over the climate domain. Five advanced AI algorithms such as extreme learning machine (ELM), Bay

... Show More
View Publication
Scopus (16)
Crossref (9)
Scopus Clarivate Crossref