Preferred Language
Articles
/
kRf6BY4BVTCNdQwCPS_y
Suggested Approach to deal with Multicollinearity Problem – with Application –
...Show More Authors

This research introduce a study with application on Principal Component Regression obtained from some of the explainatory variables to limitate Multicollinearity problem among these variables and gain staibilty in their estimations more than those which yield from Ordinary Least Squares. But the cost that we pay in the other hand losing a little power of the estimation of the predictive regression function in explaining the essential variations. A suggested numerical formula has been proposed and applied by the researchers as optimal solution, and vererifing the its efficiency by a program written by the researchers themselves for this porpuse through some creterions: Cumulative Percentage Variance, Coefficient of Determination, Variance Inflation Factor and Estimation Stability.

Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 23 2024
Journal Name
Medical Journal Of The Islamic Republic Of Iran
The Association of Neutrophil to Lymphocyte Ratio and Other Complete Blood Count Parameters with Global Registry of Acute Coronary Events Risk Score in Patients with Non-ST Segment Elevation – Acute Coronary Syndrome: A Single-Center Study
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Mustansiriyah Journal Of Sports Science
The use of training methods in accordance with special exercises to develop flexibility and perform the skills of shooting from above the chest (abduction) to wrestlers ages (14-15)"
...Show More Authors

Evolution has become a feature of this era because of the speed that makes it open multiple horizons and many to identify everything that is new in different areas and also characterized by the competitive position of emotional attitudes changing depending on the positions of winning and defeat, and the use of training methods are the most important pillars of the game of wrestling, The methods contribute to raising the level of the wrestler and refining his physical and skill potential. The problem of the research is that the shooting exercises from above the chest are very important in Roman wrestling and can be terminated by the player. Through very personal interviews for coaches and concluded that there is a weakness in the level of fl

... Show More
View Publication Preview PDF
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Advances In Intelligent Systems And Computing
Optimal Prediction Using Artificial Intelligence Application
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
International Journal Of Engineering In Computer Science
Human biometric identification: Application and evaluation
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 15 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Evaluation of EDI Software Application
...Show More Authors

The primary objective of this research is to determine the best EDI
software application that meets the users' requirements, and to show
the functionality potentially presented in any software of electronic
data interchange (EDI) system. Also, in this paper, will be addressed
issues relating to integration EDI system into business process, and
the issues regarding the performance of EDI application will also be
discussed

View Publication Preview PDF
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
A Suggested Model For Using Customer's Data Management Information System/ A Case Study In Al-Rasheed Bank/General Agent Office/ Nothren Reigon
...Show More Authors

This study aim to  identify the concept of  web based information systems since its one of the important topics that is  usually omitted by our organizations, in addition to,  designing a web based information system in order to manage the customers data of Al- Rasheed bank, as a unified information system that is specialized to the banking deals of the customers with the bank, and providing a suggested model to apply the virtual private network as a tool that is to protect the transmitted data through the web based information system.

This study is considered important because it deals with one of the vital topics nowadays, namely: how to make it possible to use a distributed informat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Al-kindy College Medical Journal
Behavior Management of Children with Autism
...Show More Authors

Background: Pervasive Developmental Disorder (PDD) is a term refers to the overarching group of conditions to which autism spectrum disorder (ASD) belongs .

Objective: This study was designed to determine the existing behavior of children with autism in dental sitting, the behavior improvements in recall dental visits and evaluate the improvement in oral hygiene with using specific visual pedagogy chart.

Type of the study: Cross-sectional study.

Methods: Forty children of both genders, ages ranged from 4 – 6 years having primary teeth only were selected whose medical history included a diagnosis

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Probabilistic Inventory Models With Pareto Distribution
...Show More Authors

Inventory or inventories are stocks of goods being held for future use or sale. The demand for a product in is the number of units that will need to be removed from inventory for use or sale during a specific period. If the demand for future periods can be predicted with considerable precision, it will be reasonable to use an inventory rule that assumes that all predictions will always be completely accurate. This is the case where we say that demand is deterministic.

The timing of an order can be periodic (placing an order every days) or perpetual (placing an order whenever the inventory declines to units).

in this research we discuss how to  formulating inv

... Show More
View Publication Preview PDF
Crossref