Preferred Language
Articles
/
vhf5_40BVTCNdQwCSizQ
Bayesian Method in Classification Regression Tree to estimate nonparametric additive model compared with Logistic Model with Application
...Show More Authors

The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree model. Having been in this research compare these methods form a model for additive function to some nonparametric function. It was a trade-off between these process models based on the classification accuracy by misclassification error, and estimation accuracy by the root of the mean squares error: RMSE. It was the application on patients with diabetes data for those aged 15 years and below are taken from the sample size (200) was withdrawn from the Children Hospital in Al-Eskan / Baghdad.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
كلية التربية-الجامعة المستنصرية
Study the diffusion of Hydrogen in metals using a Runge-Kutta method
...Show More Authors

Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Preparation of Nanoparticles in an Eco- friendly Method using Thyme Leaf Extracts
...Show More Authors

Colloidal silver nanoparticles were prepared by single step green synthesis using aqueous extracts of the leaves of thyme as a function of different molar concentration of AgNO3 (1,2,3,4 mM(. The Field Emission Scanning Electron Microscopy (FESEM), UV-Visible and X-ray diffraction (XRD) were used to characterize the resultant AgNPs. The surface Plasmon resonance was observed at wavelength of 444 nm. The four intensive peaks of XRD pattern indicate the crystalline nature and the face centered cubic structure of the AgNPs. The average crystallite size of the AgNPs ranged from 18 to 22 nm. The FESEM image illustrated the well dispersion of the AgNPs and the spherical shape of the nanoparticles with a particle size distribution be

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Insulin Like Growth Factor Binding Protein 7 as a Novel Diagnostic Marker in Sera of Iraqi Patients with Acromegaly
...Show More Authors

The purpose of this study was to measure serum levels of insulin-like growth factor-binding protein (IGFBP7), Insulin-like Growth Factor 1 (IGF-1), Growth Hormone (GH), Interleukin 6 (IL-6) and insulin in acromegaly patients and healthy controls. The acromegaly group had 60 patients, while the population group had 30 people who had never had acromegaly before. The concentration of IGFBP7, IGF-1, GH, IL-6, and insulin were determined. The results of the present study indicate that IGFBP7 level in the acromegaly group was significantly lower (1.690.07 ng/mL vs. 2.740.12 ng/mL, respectively, p = 0.001). IGF-1, GH, IL-6, and insulin concentrations were also significantly higher in acromegaly patients. The diagnostic accuracy (2.194) was exce

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Correlation Expression between P52 and BCL2 among Iraqi Women with Breast Carcinoma
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Audit bank credit risk in accordance with international auditing standards: Applied research at Rafidain Bank, Public Administration - Baghdad
...Show More Authors

This research dealt with the subject of auditing bank credit risks in accordance with international auditing standards and aims to develop procedures and design a credit risk audit program in accordance with international auditing standards and demonstrate their impact on the truth, truthfulness and fairness of financial statements and on their overall performance and continuity in the banking sector Its importance lies in relying on international auditing standards to assess and measure bank credit risk and its impact on the financial situation as well as the ability to predict financial failure. A set of conclusions have been reached, the most important of which is that the bank faces difficulties in measuring credit risk in accordance

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of risk management programs in Dealing With risks at international airports: An Applied research at Baghdad International Airport
...Show More Authors

The objective of the research is to identify the efficiency of risk management in various names at Baghdad International Airport in the face of various risks (financial - technical - human - natural ..) facing the sample of the search of the General Establishment of Civil Aviation and the Iraqi Airways Company where the researcher identified the hypothesis that summarizes There is a significant significant correlation between risk management, risk management and risk review and assessment. The researcher used the means of research from observation and interviews with the relevant officials in this field, as well as used the questionnaire and distributed a sample of 170 employees in the field of risk management (SMS Department) in Iraqi A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More