Preferred Language
Articles
/
sYbLd4YBIXToZYALwYuS
Kernel estimation of returns of retirement funds of employers based on monetary earnings (subscriptions and compensation) via regression discontinuity in Iraq
...Show More Authors

Regression Discontinuity (RD) means a study that exposes a definite group to the effect of a treatment. The uniqueness of this design lies in classifying the study population into two groups based on a specific threshold limit or regression point, and this point is determined in advance according to the terms of the study and its requirements. Thus , thinking was focused on finding a solution to the issue of workers retirement and trying to propose a scenario to attract the idea of granting an end-of-service reward to fill the gap ( discontinuity point) if it had not been granted. The regression discontinuity method has been used to study and to estimate the effect of the end -service reward on the cutoff of insured workers as well as the increase in revenues resulting from that. The research has showed that this reward has a clear effect on increasing revenues due to the regularity of workers in their work and their work continuity . It has also found that using Local Linear Smother (LLS) by using three models of bandwidth selection. Its results after the analysis in the Regression program have been as follows: The CCT (Calonico, Cattaneo & Titiunik) beamwidth gives the best performance followed by the local linear regression using the LK (Lembens and kalyanman) beamwidth. The real data has been used in sample size 71 represented in compensation as a variable of effectiveness (illustrative) X and the revenue as a result or an approved variable Y, while the results of the traditional OLS estimation method have not been good enough.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 04 2018
Journal Name
Wireless Personal Communications
IFRS: An Indexed Face Recognition System Based on Face Recognition and RFID Technologies
...Show More Authors

View Publication
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Coronavirus Disease Diagnosis, Care and Prevention (COVID-19) Based on Decision Support System
...Show More Authors

              Automated clinical decision support system (CDSS) acts as new paradigm in medical services today. CDSSs are utilized to increment specialists (doctors) in their perplexing decision-making. Along these lines, a reasonable decision support system is built up dependent on doctors' knowledge and data mining derivation framework so as to help with the interest the board in the medical care gracefully to control the Corona Virus Disease (COVID-19) virus pandemic and, generally, to determine the class of infection and to provide a suitable protocol treatment depending on the symptoms of patient. Firstly, it needs to determine the three early symptoms of COVID-19 pandemic criteria (fever, tiredness, dry cough and breat

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (16)
Crossref (6)
Scopus Crossref
Publication Date
Thu Jan 13 2011
Journal Name
Tikrit Journal Of Agricultural Sciences
ESTIMATION OF GENE ACTION AND GENETIC PARAMETERS FOR SOME CHARACTERS OF YIELD AND ITS COMPONENTS IN SUMMER SQUASH (Cucurbita pepo L.) BY USING MEAN GENERATION ANALYSIS
...Show More Authors

An experiment was carried out in the vegetables field of Horticulture Department / College of Agriculture / Baghdad University , for the three seasons : spring and Autumn of 2005 , and spring of 2007 , to study the type of gene action in some traits of yield and its components in summer squash crosses (4 x 3 = cross 1 , 3 x 7 = cross 2 , 3 x 4 = cross 3 , 3 x 5 = cross 4 , 5 x 1 = cross 5 , 5 x 2 = cross 6). The study followed generation mean analysis method which included to each cross (P1 , P2 , F1 , F2 , Bc1P1 , Bc1P2) , and those populations obtained by hybridization during the first and second seasons. Experimental comparison was performed in the second (Two crosses only) and third seasons , (four crosses) by using RCBD with three repl

... Show More
View Publication
Publication Date
Sun May 11 2025
Journal Name
Baghdad Science Journal
Development of Spectrophotometric Method for Determination of Chlorpromazine-Hydrochloride in Pharmaceutical Preparations Via Use Ion-Exchange to Overcome the Interfering Ions
...Show More Authors

View Publication
Publication Date
Sun May 11 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Estimation of the Bennett mandibular immediate side shift in Iraqi full mouth rehabilitation patients (An in vivo study)
...Show More Authors

Background: Controversy exists concerning the presence and amount of the Bennett mandibular immediate side shift among patients and whether it is necessary to accommodate for it in adjustable articulators. The aim of this study was to register and calculate the amount of any immediate side shift (ISS) present in patients requiring full mouth rehabilitation. Materials and methods: 3- dimensional condylar movements of 50 Iraqi TMD-free patients were recorded using a stereographic fully adjustable articulator system during protrusion, left and right eccentric mandibular movements. Protrusive angles of each patient were verified to figure out the suitable fossa analog for each case. The thickness of each right and left premade fossa analog sele

... Show More
View Publication Preview PDF