Preferred Language
Articles
/
0RYhVooBVTCNdQwCkpuE
Analyzing big data sets by using different panelized regression methods with application: Surveys of multidimensional poverty in Iraq
...Show More Authors

Poverty phenomenon is very substantial topic that determines the future of societies and governments and the way that they deals with education, health and economy. Sometimes poverty takes multidimensional trends through education and health. The research aims at studying multidimensional poverty in Iraq by using panelized regression methods, to analyze Big Data sets from demographical surveys collected by the Central Statistical Organization in Iraq. We choose classical penalized regression method represented by The Ridge Regression, Moreover; we choose another penalized method which is the Smooth Integration of Counting and Absolute Deviation (SICA) to analyze Big Data sets related to the different poverty forms in Iraq. Euclidian Distance (ED) was used to compare the two methods and the research conclude that the SICA method is better than Ridge estimator with Big Data conditions.

Scopus
View Publication
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Dynamic algorithm (DRBLTS) and potentially weighted (WBP) to estimate hippocampal regression parameters using a techniqueBootstrap (comparative study)
...Show More Authors

Bootstrap is one of an important re-sampling technique which has given the attention of  researches recently. The presence of outliers in the original data set may cause serious problem to the classical bootstrap when the percentage of outliers are higher than the original one. Many methods are proposed to overcome this problem such  Dynamic Robust Bootstrap for LTS (DRBLTS) and Weighted Bootstrap with Probability (WBP). This paper try to show the accuracy of parameters estimation by comparison the results of both methods. The bias , MSE and RMSE are considered. The criterion of the accuracy is based on the RMSE value since the method that provide us RMSE value smaller than other is con

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 08 2022
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
Data Hiding in 3D-Medical Image
...Show More Authors

Information hiding strategies have recently gained popularity in a variety of fields. Digital audio, video, and images are increasingly being labelled with distinct but undetectable marks that may contain a hidden copyright notice or serial number, or even directly help to prevent unauthorized duplication. This approach is extended to medical images by hiding secret information in them using the structure of a different file format. The hidden information may be related to the patient. In this paper, a method for hiding secret information in DICOM images is proposed based on Discrete Wavelet Transform (DWT). Firstly. segmented all slices of a 3D-image into a specific block size and collecting the host image depend on a generated key

... Show More
View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Communications
SDN Implementation in Data Center Network
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Tue Dec 03 2013
Journal Name
Baghdad Science Journal
Satellite Images Unsupervised Classification Using Two Methods Fast Otsu and K-means
...Show More Authors

Publication Date
Sun Jun 12 2011
Journal Name
Baghdad Science Journal
Satellite Images Unsupervised Classification Using Two Methods Fast Otsu and K-means
...Show More Authors

Two unsupervised classifiers for optimum multithreshold are presented; fast Otsu and k-means. The unparametric methods produce an efficient procedure to separate the regions (classes) by select optimum levels, either on the gray levels of image histogram (as Otsu classifier), or on the gray levels of image intensities(as k-mean classifier), which are represent threshold values of the classes. In order to compare between the experimental results of these classifiers, the computation time is recorded and the needed iterations for k-means classifier to converge with optimum classes centers. The variation in the recorded computation time for k-means classifier is discussed.

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 12 2024
Journal Name
World Water Policy
The effect of natural factors on changing soil uses in the marshes: An experimental study using Landsat satellite data
...Show More Authors

The study aimed to analyze the effect of meteorological factors (rainfall rate and temperature) on the change in land use in the marshes of the Al‐Majar Al‐Kabir region in southern Iraq. Satellite images from Landsat 7 for 2012 and Landsat 8 for 2022 were used to monitor changes in the land coverings, the images taken from the Enhanced Thematic Mapper Plus (ETM+) and Operational Land Imager (OLI) sensors of the Landsat satellite. Geometric correction was used to convert images into a format with precise geographic coordinates using ArcMap 10.5. The maximum likelihood classification method was used to examine satellite image data using a supervised approach, and the data were analyzed statistically. We obtained clear images of the area,

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Optik
Synthesis of Ag2O films by pulsed laser deposited on porous silicon as gas sensor application
...Show More Authors

View Publication
Scopus (49)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Wed Oct 23 2019
Journal Name
Iraqi Journal Of Agricultural Sciences
EXTRACTION OF JOJOBA OIL USING VARIOUS CONCENTRATIONS OF TWO DIFFERENT SOLVENTS
...Show More Authors

The aim of this study was extraction of jojoba oil using different solvents. A mixture of waterhexane and water-ethanol are used as solvents to extract jojoba oil in a batch extraction process and compared with a pure solvent extraction process. The effects of particle size of crushed seeds, solvent-to-water ratio and time on jojoba oil extraction were investigated. The best recovery of oil was obtained at the boiling temperature of the solvent and four hour of extraction time. When seed particle size was 0.45 mm and a pure ethanol was used (45% yield of oil extraction), whereas, it was 40% yield of oil at 25% water-hexane mixture. It was revealed that the water-ethanol and water-hexane mixtures have an effect on the oil extraction yield. T

... Show More
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Engineering
Analysis of Prosthetic Running Blade of Limb Using Different Composite Materials
...Show More Authors

Prostheses are used as an alternative to organs lost from the body. Flex-Foot Cheetah is considered one of the lower limb prostheses used in high-intensity activities such as running. This research focused on testing two samples of Flex-Foot Cheetah manufactured of two various materials (carbon, glass) with polyester and compare between them to find the foot with the best performance in running on the level of professional athlete. In the numerical analysis, the maximum principal stress, maximum principal elastic strain, strain energy; finally, the blade total deformation were calculated for both feet. In experimental work, the load-deflection test was done for foot to calculate the bending the results were very close to

... Show More
View Publication Preview PDF
Crossref (16)
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More