Preferred Language
Articles
/
PBdllY4BVTCNdQwCq1Wc
Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
...Show More Authors

Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application

Publication Date
Wed Feb 01 2023
Journal Name
International Journal Of Revolution In Science And Humanity
Nonparametric Estimation of Failure Periods for Log Normal Distribution Using Bootstra
...Show More Authors

A non-parametric kernel method with Bootstrap technology was used to estimate the confidence intervals of the system failure function of the log-normal distribution trace data. These are the times of failure of the machines of the spinning department of the weaving company in Wasit Governorate. Estimating the failure function in a parametric way represented by the method of the maximum likelihood estimator (MLE). The comparison between the parametric and non-parametric methods was done by using the average of Squares Error (MES) criterion. It has been noted the efficiency of the nonparametric methods based on Bootstrap compared to the parametric method. It was also noted that the curve estimation is more realistic and appropriate for the re

... Show More
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of The College Of Languages (jcl)
فارسی Practical application of Jean René Ladmiral's model in translation from Arabic to Persian: کاربست عملی الگوی ژان رنه لادمیرال در ترجمه از عربی به فارسی
...Show More Authors

Translation is a dynamic and living process that cannot be considered equal to the original text and requires the appropriate structure, language, thought and culture of the target language, and the translator's intellectual, linguistic and cultural influences inadvertently penetrate into the translated text. It causes heterogeneity of the destination text with the source text.

Admiral's theory is trying to help by providing components and suggested approaches to resolve these inconsistencies. In the meantime, in addition to the mission of putting words together, the translator must sometimes sit in the position of the reader and judge and evaluate the translated text in order to understand its shortcomings and try to correct it a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Using Bayesian method to estimate the parameters of Exponential Growth Model with Autocorrelation problem and different values of parameter of correlation-using simulation
...Show More Authors

We have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.

The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Acta Chromatographica
A simple stability-indicating HPLC method for simultaneous analysis of paracetamol and caffeine and its application to determinations in fixed-dose combination tablet dosage form
...Show More Authors

A simple, economic, rapid, reliable, and stability-indicating high-performance liquid chromatography (HPLC) method has been developed and validated for the simultaneous determination of paracetamol (PCM) and caffeine (CF) in solid dosage form. The chromatographic separations were achieved with a Waters Symmetry® C18 column (5 μm, 4.6 × 150 mm), using a mixture of methanol and water (40:60, v/v) as a mobile phase, under isocratic elution mode with a flow rate of 0.8 mL/min, and ultraviolet (UV) detection was set at 264 nm. The oven temperature for the column was set and maintained at 35 °C. The method was validated according to International Conference on Harmonization (ICH) guidelines, and it demonstrated excellent linearity, wi

... Show More
View Publication
Scopus (25)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Women of drama between theoretical and practical
...Show More Authors

Greek theatre and roman theatre don’t let for woman with working in the theatre such as writer , directing and acting theatre , so appear term women theatre in past sixty central because the woman feeling with iniquitousness in your life , so this search included several sections that include money parts . Part one is term theatre women. Part two causes show the women theatre. Part three jenouse women in writer, direction, and action in the world. Part four jenouse women in the Arab theatre. Part fife Iraqi woman jenouse in the theatre. Section tow includes analyses for once performance Iraqi theatre that include several women. This performance from editor and direction by kaseem – Muhammad, assistant in the direction montaha – rah

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Speech Enhancement Algorithm Based on a Hybrid Estimator
...Show More Authors
Abstract<p>Speech is the essential way to interact between humans or between human and machine. However, it is always contaminated with different types of environment noise. Therefore, speech enhancement algorithms (SEA) have appeared as a significant approach in speech processing filed to suppress background noise and return back the original speech signal. In this paper, a new efficient two-stage SEA with low distortion is proposed based on minimum mean square error sense. The estimation of clean signal is performed by taking the advantages of Laplacian speech and noise modeling based on orthogonal transform (Discrete Krawtchouk-Tchebichef transform) coefficients distribution. The Discrete Kra</p> ... Show More
View Publication
Crossref (11)
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Application the generalized estimating equation Method (GEE) to estimate of conditional logistic regression model for repeated measurements
...Show More Authors

Conditional logistic regression is often used to study the relationship between event outcomes and specific prognostic factors in order to application of logistic regression and utilizing its predictive capabilities into environmental studies. This research seeks to demonstrate a novel approach of implementing conditional logistic regression in environmental research through inference methods predicated on longitudinal data. Thus, statistical analysis of longitudinal data requires methods that can properly take into account the interdependence within-subjects for the response measurements. If this correlation ignored then inferences such as statistical tests and confidence intervals can be invalid largely.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
مجلة جامعة جكريث للعلوم الزراعية
Effect of GA3 and Method Application of Humic Acid on Some Vegetative Characteristics of Plum PRUNUS SALICINA L.
...Show More Authors