Preferred Language
Articles
/
bsj-5159
Variable Selection Using aModified Gibbs Sampler Algorithm with Application on Rock Strength Dataset
...Show More Authors

Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage and Selection Operator (Lasso), and Tikhonov Regularization (Ridge). The simulation studiesshow that the performance of our method is better than the othersaccording to the error and the time complexity. Thesemethodsare applied to a real dataset, which is called Rock StrengthDataset.The new approach implemented using the Gibbs sampler is more powerful and effective than other approaches.All the statistical computations conducted for this paper are done using R version 4.0.3 on a single processor computer.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 31 2024
Journal Name
Iraqi Geological Journal
Determination of Reservoir Rock Type in Sarvak Reservoir of an Iranian Oilfield
...Show More Authors

Integrated reservoir rock typing in carbonate reservoirs is a significant step in reservoir modelling. The key purpose of this study is the identification of integrated rock types in the Sarvak Formation of an Iranian oilfield. In this study, electrofacies (EFAC) analysis of the Sarvak reservoir was done in detail to determine the reservoir quality and rock types of the Sarvak Formation in the studied field. The core data and conventional petrophysical logs were used for rock typing. Some petrophysical logs such as porosity, sonic, neutron, density, and Photo electric factor were applied as input data for electrofacies analysis. Multi-Resolution Graph-Based Clustering was used among six approaches, resulting in four electrofacies af

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Apr 22 2026
Journal Name
Modeling Earth Systems And Environment
Ghost-rock karstification and cave system modelling in the Middle Atlas, Morocco
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Jul 01 2012
Journal Name
International Journal Of Computer Mathematics
Numerical solution of the two-dimensional Helmholtz equation with variable coefficients by the radial integration boundary integral and integro-differential equation methods
...Show More Authors

View Publication
Crossref (13)
Crossref
Publication Date
Sat May 24 2025
Journal Name
Iraqi Journal For Computer Science And Mathematics
Intrusion Detection System for IoT Based on Modified Random Forest Algorithm
...Show More Authors

An intrusion detection system (IDS) is key to having a comprehensive cybersecurity solution against any attack, and artificial intelligence techniques have been combined with all the features of the IoT to improve security. In response to this, in this research, an IDS technique driven by a modified random forest algorithm has been formulated to improve the system for IoT. To this end, the target is made as one-hot encoding, bootstrapping with less redundancy, adding a hybrid features selection method into the random forest algorithm, and modifying the ranking stage in the random forest algorithm. Furthermore, three datasets have been used in this research, IoTID20, UNSW-NB15, and IoT-23. The results are compared with the three datasets men

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (45)
Crossref (44)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (25)
Crossref (13)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
A Tile with Nested Chain Abacus
...Show More Authors

This study had succeeded in producing a new graphical representation of James abacus called nested chain abacus. Nested chain abacus provides a unique mathematical expression to encode each tile (image) using a partition theory where each form or shape of tile will be associated with exactly one partition.Furthermore, an algorithm of nested chain abacus movement will be constructed, which can be applied in tiling theory.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Mon May 18 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Early and delayed effect of 2% chlorhexidine on the shear bond strength of composite restorative material to dentin using a total etch adhesive
...Show More Authors

Background: Lack of durability of the bond of the dental adhesive systems to tooth structure is one of the most important problems in tooth colored restorative work. This in vitro study was performed to evaluate the effect of 2% chlorhexidine gluconate(CHX) on dentin bond strength by using total etch adhesive system at twenty-four hours and three months of water storage. Material and methods:A flat dentin surface was prepared for forty sound human maxillary premolar teeth which were acid etched with 36% phosphoric acid gel after being divided randomly into four groups of ten teeth each according to storage time and CHX application, theCHX was applied for 60 seconds before adhesive application for groups I and III which were tested after twe

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 07 2017
Journal Name
International Journal Of Science And Research (ijsr)
Automatic brain tumor segmentation from MRI Images using superpixels based split and Merge algorithm
...Show More Authors

RA Ali, LK Abood, Int J Sci Res, 2017 - Cited by 2

View Publication