Preferred Language
Articles
/
qhY5c4cBVTCNdQwCjUtA
Cluster and factor analyses R and Q mode technique of geochemical and petrological data of the Shalair Metamorphic Rock Group, Shalair Valley area, Northeastern Iraq
...Show More Authors

Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
The Simulation Technique to Estimate the Parameters of Generalized Exponential Rayleigh Model
...Show More Authors

     The paper shows how to estimate the three parameters of the generalized exponential Rayleigh distribution by utilizing the three estimation methods, namely, the moment employing estimation method (MEM), ordinary least squares estimation method (OLSEM),  and maximum entropy estimation method (MEEM). The simulation technique is used for all these estimation methods to find the parameters for the generalized exponential Rayleigh distribution. In order to find the best method, we use the mean squares error criterion. Finally, in order to extract the experimental results, one of object oriented programming languages visual basic. net was used

View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Jan 01 2010
Journal Name
Ibn Al- Haitham J. Fo R Pure & Appl. Sci
Evaluation of The Nuclear Data on(α,n)Reaction for Natural Molybdenum
...Show More Authors

The cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element

... Show More
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Investigating the quality of open street map roads data inside Baghdad city
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
International Journal Of Inventive Engineering And Science,
Increase the Capacity Amount of Data Hiding to Least Significant BIT Method
...Show More Authors

Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Estimating the Parameters of Exponential-Rayleigh Distribution under Type-I Censored Data
...Show More Authors

     This paper discusses estimating the two scale parameters of Exponential-Rayleigh distribution for singly type one censored data which is one of the most important Rights censored data, using the maximum likelihood estimation method (MLEM) which is one of the most popular and widely used classic methods, based on an iterative procedure such as the Newton-Raphson to find estimated values for these two scale parameters by using real data for COVID-19 was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. The duration of the study was in the interval 4/5/2020 until 31/8/2020 equivalent to 120 days, where the number of patients who entered the (study) hospital with sample size is (n=785). The number o

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Journal Of Engineering
Analysis of Recorded Inflow Data of Ataturk Reservoir
...Show More Authors

Since the beginning of the last century, the competition for water resources has intensified dramatically, especially between countries that have no agreements in place for water resources that they share. Such is the situation with the Euphrates River which flows through three countries (Turkey, Syria, and Iraq) and represents the main water resource for these countries. Therefore, the comprehensive hydrologic investigation needed to derive optimal operations requires reliable forecasts. This study aims to analysis and create a forecasting model for data generation from Turkey perspective by using the recorded inflow data of Ataturk reservoir for the period (Oct. 1961 - Sep. 2009). Based on 49 years of real inflow data

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 19 2018
Journal Name
Journal Of Economics And Administrative Sciences
Big Data Approch to Enhance Organizational Ambidexterity An Exploratory Study of a Sample of Managers at ASIA Cell For Mobile Telecommunication Company in Iraq
...Show More Authors

               The research aimed at measuring the compatibility of Big date with the organizational Ambidexterity dimensions of the Asia cell  Mobile telecommunications company in Iraq in order to determine the possibility of adoption of Big data Triple as a approach to achieve organizational Ambidexterity.

The study adopted the descriptive analytical approach to collect and analyze the data collected by the questionnaire tool developed on the Likert scale After  a comprehensive review of the literature related to the two basic study dimensions, the data has been subjected to many statistical treatments in accordance with res

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The role of organizational change in easing the organizational conflict: an exploratory study of the opinions of a sample of managers and workers in Iraq to EarthLink Network Services Company And communications
...Show More Authors

Research on the role of organizational change in easing the organizational conflict focuses for being one of the important topics and relatively modern and which have a significant impact on the future of organizations, so this study was to identify the relationship and the impact of organizational change and of deportation (technological, organizational structure, human resources, the change in the task) at the organizational conflict in the Earth company link Iraq, in order to reach the goals of the research, it has been the development of a questionnaire distributed to a random sample of (100) composed employees from managers and heads of departments and the people and staff at the Earth company link Iraq, the study found: the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Periodontitis among a Group of Type TwoDiabetic Patientsin Relation to Risk of Vascular Disease
...Show More Authors

Background: Type two diabetic patients have higher risk of cardiovascular and periodontal disease. Furthermore, patients with more severe periodontal disease have higher incidence of cardiovascular disease. This study aimed to assess the association between periodontal health status and the risk of vascular disease in type 2 diabetic patients. Materials and Methods: One hundred type 2 diabetes mellitus patients and fifty apparently healthy males were enrolled in this study. Oral examinations conducted were; plaque Index, calculus index, gingival index, probing pocket depth, and clinical attachment level. For the assessment of vascular risk, arterial stiffness index was used. Results: According to arterial stiffness index, type 2 diabetic p

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More