Preferred Language
Articles
/
wxdWPo4BVTCNdQwCEj4x
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (21)
Crossref (10)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Solving multicollinearity problem of gross domestic product using ridge regression method
...Show More Authors

This study is dedicated to solving multicollinearity problem for the general linear model by using Ridge regression method. The basic formulation of this method and suggested forms for Ridge parameter is applied to the Gross Domestic Product data in Iraq. This data has normal distribution. The best linear regression model is obtained after solving multicollinearity problem with the suggesting of 10 k value.

Scopus (4)
Scopus
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate Kernel Ridge Regression Function in Multiple Regression
...Show More Authors

             In general, researchers and statisticians in particular have been usually used non-parametric regression models when the parametric methods failed to fulfillment their aim to analyze the models  precisely. In this case the parametic methods are useless so they turn to non-parametric methods for its easiness in programming. Non-parametric methods can also used to assume the parametric regression model for subsequent use. Moreover, as an advantage of using non-parametric methods is to solve the problem of Multi-Colinearity between explanatory variables combined with nonlinear data. This problem can be solved by using kernel ridge regression which depend o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
E3s Web Of Conferences
Enhancing the Ability of The Square Footing to Resist Positive and Negative Eccentric Inclined Loading Using an Inclined Skirt
...Show More Authors

Laboratory model tests were performed to investigate the behavior of shallow and inclined skirted foundations placed on sandy soil with R.D%=30 and the extent of the impact of the positive and negative eccentric-inclined loading effect on them. To achieve the experimental tests, it was used a box of (600×600) mm cross-sectional and 600mm in height and a square footing of (50*50) mm and 10 mm in thickness attached to the skirt with Ds=0.5B and various an angle of (10°, 20°, 30°). The results showed that using skirts leads to a significant improvement in load-carrying capacity and decreased settlement. In addition, when the skirt angle increased, the ultimate load improved. Load-carrying capacity decreased with increasing eccentri

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Pharmacoeconomics Study for Anticoagulants used for Hospitalized COVID-19 Patients in Al-Najaf Al-Ashraf city –Iraq(Conference Paper )#
...Show More Authors

Abstract

Background: The novel coronavirus 2 (SARS?CoV?2) pandemic is a pulmonary disease, which leads to cardiac, hematologic, and renal complications. Anticoagulants are used for COVID-19 infected patients because the infection increases the risk of thrombosis. The world health organization (WHO), recommend prophylaxis dose of anticoagulants: (Enoxaparin or unfractionated Heparin for hospitalized patients with COVID-19 disease. This has created an urgent need to identify effective medications for COVID-19 prevention and treatment. The value of COVID-19 treatments is affected by cost-effectiveness analysis (CEA) to inform relative value and how to best maximize social welfare through eviden

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn: 1683 - 3597 , E-issn : 2521 - 3512)
A Pharmacoeconomics Study for Anticoagulants used for Hospitalized COVID-19 Patients in Al-Najaf Al-Ashraf city –Iraq(Conference Paper )#
...Show More Authors

Abstract Background: The novel coronavirus 2 (SARS?CoV?2) pandemic is a pulmonary disease, which leads to cardiac, hematologic, and renal complications. Anticoagulants are used for COVID-19 infected patients because the infection increases the risk of thrombosis. The world health organization (WHO), recommend prophylaxis dose of anticoagulants: (Enoxaparin or unfractionated Heparin for hospitalized patients with COVID-19 disease. This has created an urgent need to identify effective medications for COVID-19 prevention and treatment. The value of COVID-19 treatments is affected by cost-effectiveness analysis (CEA) to inform relative value and how to best maximize social welfare through evidence-based pricing decisions. O

... Show More
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Mining Deviations in Document Writing Style through Vector Dissimilarity
...Show More Authors

     Doubts arise about the originality of a document when noticing a change in its writing style. This evidence to plagiarism has made the intrinsic approach for detecting plagiarism uncover the plagiarized passages through the analysis of the writing style for the suspicious document where a reference corpus to compare with is absent.      The proposed work aims at discovering the deviations in document writing style through applying several steps: Firstly, the entire document is segmented into disjointed segments wherein each corresponds to a paragraph in the original document. For the entire document and for each segment, center vectors comprising average  weight of their word  are constructed. Second, the degree of cl

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE SUSTANABLE MARKETING IMMUNITY OF TOURIST OF BUSINESS IN LIGHT OF THE PANDEMIC-CORONA (COVID-19) AN APPLIED RESEARCH IN TRAVEL AND TOURISM COMPANIES IN BAGHDAD: THE SUSTANABLE MARKETING IMMUNITY OF TOURIST OF BUSINESS IN LIGHT OF THE PANDEMIC-CORONA (COVID-19) AN APPLIED RESEARCH IN TRAVEL AND TOURISM COMPANIES IN BAGHDAD
...Show More Authors

The research aims to how to deal with certain situation to ensure the continuous competitive excellence of business market under the situation of covid-19, especially how to deal with major challenges, identifying the capabilities of tourism industry, investigating the ability of tourism agencies to resist the dynamic change of both internal as well as external environment to ensure their sustainability.

The important here as the paper notice, is how to be efficient and trying to find solutions in order to grow and survive through choosing certain strategies that aligned the critical issues.

Thus to achieve this level, many scenarios planed that could adopt in case of such pande

... Show More
View Publication Preview PDF