Preferred Language
Articles
/
kRf6BY4BVTCNdQwCPS_y
Suggested Approach to deal with Multicollinearity Problem – with Application –
...Show More Authors

This research introduce a study with application on Principal Component Regression obtained from some of the explainatory variables to limitate Multicollinearity problem among these variables and gain staibilty in their estimations more than those which yield from Ordinary Least Squares. But the cost that we pay in the other hand losing a little power of the estimation of the predictive regression function in explaining the essential variations. A suggested numerical formula has been proposed and applied by the researchers as optimal solution, and vererifing the its efficiency by a program written by the researchers themselves for this porpuse through some creterions: Cumulative Percentage Variance, Coefficient of Determination, Variance Inflation Factor and Estimation Stability.

Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison between some well- Known methods to estimate the parameter of the proposed method of measurement and the reliability of the distribution function with two parameters Rally by simulation
...Show More Authors

 

 

Abstract

            Rayleigh distribution is one of the important distributions used for analysis life time data, and has applications in reliability study and physical interpretations. This paper introduces four different methods to estimate the scale parameter, and also estimate reliability function; these methods are Maximum Likelihood, and Bayes and Modified Bayes, and Minimax estimator under squared error loss function, for the scale and reliability function of the generalized Rayleigh distribution are obtained. The comparison is done through simulation procedure, t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 01 2016
Journal Name
Journal Of Pharmaceutical, Chemical And Biological Sciences
Review on: Vaginitis. A problem to be solved!!
...Show More Authors

Candida is the scientific name for yeast. It is a fungus that lives almost everywhere, including in human body. Usually, the immune system keeps yeast under control. If the individual is sick or taking antibiotics, it can multiply and cause an infection. Yeast infections affect different parts of the body in different ways including thrush is a yeast infection that causes white patches in oral cavity ,Candida esophagitis is thrush that spreads to esophagus, women can get vaginal yeast infections,(vaginitis) causing itchiness, pain and discharge, yeast infections of the skin cause itching and rashes ,yeast infections in bloodstream can be life-threatening . The current review article will concentrate on vaginal infection (vaginitis), project

... Show More
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Public Budget and the Roles of Legislative and Executive Power Regarding It with Reference to Iraq)2004-2011)
...Show More Authors

The public budget is regarded a main tool for economic and social development. The preparation of the public budget constitute an important stream which enriches the developmental efforts and the definition of its priorities, therefore it is the focus point of many specializations. The public budget has numerous functions. It is a means to precise and to execute the political and economic goals of the executive authority, a mirror of the economic structure which reflects its strength and weakness points, specifies its revenues and others. Since the parliament is the voice of the society which expresses its interests, then, it must monitor the performance of the government so that the participation of the legislative authority in

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

 This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis

View Publication Preview PDF
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
Application of WDR Technique with different Wavelet Codecs for Image Compression
...Show More Authors

FG Mohammed, HM Al-Dabbas, Iraqi journal of science, 2018 - Cited by 6

View Publication
Scopus (9)
Scopus
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
An Application Model for Linear Programming with an Evolutionary Ranking Function
...Show More Authors

One of the most important methodologies in operations research (OR) is the linear programming problem (LPP). Many real-world problems can be turned into linear programming models (LPM), making this model an essential tool for today's financial, hotel, and industrial applications, among others. Fuzzy linear programming (FLP) issues are important in fuzzy modeling because they can express uncertainty in the real world. There are several ways to tackle fuzzy linear programming problems now available. An efficient method for FLP has been proposed in this research to find the best answer. This method is simple in structure and is based on crisp linear programming. To solve the fuzzy linear programming problem (FLPP), a new ranking function (R

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Generalized Left Derivations with Identities on Near-Rings
...Show More Authors

In this paper, new concepts which are called: left derivations and generalized left derivations in nearrings have been defined. Furthermore, the commutativity of the 3-prime near-ring which involves some
algebraic identities on generalized left derivation has been studied.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (8)
Scopus Clarivate Crossref