Preferred Language
Articles
/
5heU5I8BVTCNdQwCp39D
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Methods of Arab TV Programs Production
...Show More Authors

This research investigates the methods of producing Investigative Arabic Television Programs that are able to prove its existence during a short period of time as a form of Television programs on Arab satellite channels growing in number and varied in content. The research aims to present qualitative and quantitative descriptions of the methods used in tackling the topics discussed in the program, and knowing whether they satisfy the conditions and scientific foundations for the research, investigation, analysis, and interpretation. The researcher uses the survey method and uses the tool of content analysis including a set of methodological steps that seek to discover the implied meaning of the research sample represented by the program

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 04 2024
Journal Name
مجلة مركز بابل للدراسات الانسانية
The Rhetorical methods in Hebrew advertisements
...Show More Authors

Advertisement is one of the Media most efficient persuasive communicative activities designed to marketing different ideas and products with the aim of influencing consumers' perception of goods and services. The present study sheds light on the most prominent rhetorical devices that constitute the persuasive structure of the Hebrew advertisements published in various media outlet. The study is conducted by means of analyzing the linguistic structure of the advertising texts and according to the analytic and descriptive approach to know the characteristics and the functions of the oratorical devices used in the advertising industry. The research elucidates that most of the advertisements are written in slang language, and this is due to th

... Show More
Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Hurst exponent estimation methods
...Show More Authors

Publication Date
Fri Feb 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian methods to estimate sub - population
...Show More Authors

The aim of the research is to estimate the hidden population. Here، the number of drug users in Baghdad was calculated for the male age group (15-60) years old ، based on the Bayesian models. These models are used to treat some of the bias in the Killworth method Accredited in many countries of the world.

Four models were used: random degree، Barrier effects، Transmission bias، the first model being random، an extension of the Killworth model، adding random effects such as variance and uncertainty Through the size of the personal network، and when expanded by adding the fact that the respondents have different tendencies، the mixture of non-random variables with random to produce

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Compare Estimate Methods of Parameter to Scheffʼe Mixture Model By Using Generalized Inverse and The Stepwise Regression procedure for Treatment Multicollinearity Problem
...Show More Authors

Mixture experiments are response variables based on the proportions of component for this mixture. In our research we will compare the scheffʼe model with the kronecker model for the mixture experiments, especially when the experimental area is restricted.

     Because of the experience of the mixture of high correlation problem and the problem of multicollinearity between the explanatory variables, which has an effect on the calculation of the Fisher information matrix of the regression model.

     to estimate the parameters of the mixture model, we used the (generalized inverse ) And the Stepwise Regression procedure

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparison some of methods wavelet estimation for non parametric regression function with missing response variable at random
...Show More Authors

Abstract

 The problem of missing data represents a major obstacle before researchers in the process of data analysis in different fields since , this problem is a recurrent one in all fields of study including social , medical , astronomical and clinical experiments .

The presence of such a problem within the data to be studied may influence negatively on the analysis and it may lead to misleading conclusions , together with the fact that these conclusions that result from a great bias caused by that problem in spite of the efficiency of wavelet methods but they are also affected by the missing of data , in addition to the impact of the problem of miss of accuracy estimation

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Some Estimation Methods for Mixed-Random Panel Data Regression Models with Serially Correlated Errors with Application
...Show More Authors

This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 06 2014
Journal Name
Journal Of Economics And Administrative Sciences
Modeling Absolute Deviations Method by using Numerical Methods to measure the dispersion of the proposal for error
...Show More Authors

Is in this research review of the way minimum absolute deviations values ​​based on linear programming method to estimate the parameters of simple linear regression model and give an overview of this model. We were modeling method deviations of the absolute values ​​proposed using a scale of dispersion and composition of a simple linear regression model based on the proposed measure. Object of the work is to find the capabilities of not affected by abnormal values by using numerical method and at the lowest possible recurrence.

 

View Publication Preview PDF
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref