Preferred Language
Articles
/
jperc-1019
Comparison between Rush Model Parameters to Completed and Lost Data by Different Methods of Processing Missing Data
...Show More Authors

The current study aims to compare between the assessments of the Rush model’s parameters to the missing and completed data in various ways of processing the missing data. To achieve the aim of the present study, the researcher followed the following steps: preparing Philip Carter test for the spatial capacity which consists of (20) items on a group of (250) sixth scientific stage students in the directorates of Baghdad Education at Al–Rusafa (1st, 2nd and 3rd) for the academic year (2018-2019). Then, the researcher relied on a single-parameter model to analyze the data. The researcher used Bilog-mg3 model to check the hypotheses, data and match them with the model. In addition, the researcher relied on chi-squared value for each item at (0.05).  After that, the researcher found out the parameters of the missing data after relying on a loss percentage (10%) and used three ways to treat them (mean, regression, likelihood). The results showed that the comparison between the parameters completed and missing data by using three ways of processing the missing data is in favor of the parameters of the completed data, and the likelihood way is the suitable way to treat the completed data. 

     The conclusions, recommendations and suggestions have been drawn based on the findings.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison Of Oral Health Status And Behavior between First And Fifth Years Of Al-Mustansiriyah Dental Students
...Show More Authors

Background:Periodontal diseases and dental caries are the most common oral diseases, but they can be adequately prevented by adopting a specific health behavior and plaque control.The study was carried out to determine and compare oral health status; it included both caries experience, gingival health and oral hygiene behavior betweenfirst and fifth yearsof Al-Mustansiriyahdental students. Materials and methods: Total sample of the study consisted of 50 students at first year (25 males, 25 females)and 60 students at fifth year (30 males, 30 females). Plaque andgingival indices,dental caries indices (DMFS and DMFT) wererecorded to evaluateoral health status for each student. Further questionnaires were given to evaluate different oral hyg

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2019
Journal Name
Journal Of Engineering
Optimization of Friction Stir Welding Process Parameters to joint 7075-T6 Aluminium Alloy by Utilizing Taguchi Technique
...Show More Authors

In this study, a 3 mm thickness 7075-T6 aluminium alloy sheet was used in the friction stir welding process. Using the design of experiment to reduce the number of experiments and to obtain the optimum friction stir welding parameters by utilizing Taguchi technique based on the ultimate tensile test results. Orthogonal array of L9 (33) was used based on three numbers of the parameters and three levels for each parameter, where shoulder-workpiece interference depth (0.20, 0.25, and 0.3) mm, pin geometry (cylindrical thread flat end, cylindrical thread with 3 flat round end, cylindrical thread round end), and thread pitch (0.8, 1, and 1.2) mm) this technique executed by Minitab 17 software. The results showed th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri May 31 2024
Journal Name
Journal Of Current Medical Research And Opinion
Comparing Different Training Methods in Cardiopulmonary Resuscitation CPR: A Narrative Review
...Show More Authors

Publication Date
Fri Jan 26 2024
Journal Name
Iraqi Journal Of Science
Monthly Carbone Monoxide (CO) Distribution Based on the 2010 MOPITT Satellite Data in Iraq
...Show More Authors

Carbon monoxide (CO) plays an important indirect greenhouse gases due to its influences on the budgets of hydroxyl radicals (OH) and Ozone (O3). The atmospheric carbon monoxide (CO) observations can only be made on global and continental scales by remote sensing instruments situated in space. One of instrument is the Measurements of Pollution in the Troposphere (MOPITT), which is designed to measure troposphere CO and CH4 by use of a nadir-viewing geometry and was launched aboard the Earth Observing System (EOS) Terra spacecraft on 18 December 1999. Results from the analysis of the retrieved monthly (1ºх1º) spatial grid resolution, from the MOPITT data were utilized to analyze the distribution of CO surface mixing ratio in Iraq for th

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func

... Show More
View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The biography of the Prophet Muhammad () and his Sunnah between softness and distress
...Show More Authors

The Prophet Muhammed () is distinguished in the history of mankind by the fact that he came with a law that combined these two opposing sides, reality and ideals, a wonderful and amazing collection, and he created a wonderful composition between them, and they used together a wise comprehension to ensure the treatment of its ills, and the reform of their delusions together, and uses both Both of them are in the necessary position of the needs of life, and the contradictions and separation of this collection and the wise harness in this research from his law, may God bless him and grant him peace, which shows us this balance in the system of Islam, the most sincere representation, where it is one of the honors of morality, good appreci

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 31 2023
Journal Name
College Of Islamic Sciences
The concept of inconsistency and measuring the inverse relationship between overlap and contrast.
...Show More Authors

 

abstract:

The aim of this study is to clarify the relationship between the concept of  inconsistency and the measurement of the inverse relationship of overlap and contrast. The study will address the following points:

  1. Explaining the true nature of inconsistency and contrast, as understanding their relationship is essential for determining them.
  2. Examining the view of the scholars regarding their significance as approaches to understanding the relationship.
  • Identifying the relationship between inconsistency and contrast in terms of overlap and contrast.

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Al–bahith Al–a'alami
Young People between Traditional Media and New Media
...Show More Authors

This Research based on an empirical study and tested the hypothesis of transition effects on a sample of young people in Sharjah University and trying to identify a new form of Media which is based on the production of new types of habits and patterns and their cultural impact. Recently, New Media appeared to refer to new types of Communication using the Internet. It’s enormous in the exchange of Information. The new Media contains multiple forms, including the form in which users produce by them to refer the entry of a new area of Media in which exchange of roles between the Sender and the recipient.

This study is trying to identify a new form of Media Web used (Press online or only Press online, Digi

... Show More
View Publication Preview PDF
Crossref