Preferred Language
Articles
/
ijp-261
Temperatture esttiimattiion off EXDRA and SSUMI dwarff Nova systtems from spectroscopic data
...Show More Authors

The seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Some Estimation Methods Of GM(1,1) Model With Missing Data and Practical Application
...Show More Authors

This paper presents a grey model GM(1,1) of the first rank and a variable one and is the basis of the grey system theory , This research dealt  properties of grey model and a set of methods to estimate parameters of the grey model GM(1,1)  is the least square Method (LS) , weighted least square method (WLS), total least square method (TLS) and gradient descent method  (DS). These methods were compared based on two types of standards: Mean square error (MSE), mean absolute percentage error (MAPE), and after comparison using simulation the best method was applied to real data represented by the rate of consumption of the two types of oils a Heavy fuel (HFO) and diesel fuel (D.O) and has been applied several tests to

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Validation of Time-Safety Influence Curve Using Empirical Safety and Injury Data—Poisson Regression
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Efficiency Measurement Model for Postgraduate Programs and Undergraduate Programs by Using Data Envelopment Analysis
...Show More Authors

Measuring the efficiency of postgraduate and undergraduate programs is one of the essential elements in educational process. In this study, colleges of Baghdad University and data for the academic year (2011-2012) have been chosen to measure the relative efficiencies of postgraduate and undergraduate programs in terms of their inputs and outputs. A relevant method to conduct the analysis of this data is Data Envelopment Analysis (DEA). The effect of academic staff to the number of enrolled and alumni students to the postgraduate and undergraduate programs are the main focus of the study.

 

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jul 01 2025
Journal Name
Mastering The Minds Of Machines
The Intersection of AI and the Internet of Things (IoT): Transforming Data into Intelligence
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (13)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Preparation-and Spectroscopic Characterization of Transition Metal Complexes with Schiff base 2-[1-(1H-indol-3-yl)ethylimino) methyl]naphthalene-1-ol
...Show More Authors

The ligand 2-[1-(1H-indol-3-yl)ethylimino) methyl]naphthalene-1-ol, derived from 1-hydroxy-2-naphthaldehyde and 2-(1H-indol-3-yl)ethylamine, was used to produce a new sequence of metal ions complexes. Thus ligand reactions with NiCl2.6H2O, PdCl2, FeCl3.6H2O and H2PtCl6.6H2O were sequentially made to collect mono-nuclear Ni(II), Pd(II), Fe (III), and Pt(IV). (IR or FTIR), Ultraviolet Reflective (UV–visible), Mass Spectra analysis, Bohr-magnetic (B.M.), metal content, chloride content and molar conductivity have been the defining features of the composites. The Fe(III) and Pt(IV) complexes have octahedral geometries, while the Ni(II) complex has tetra

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and Spectroscopic Characterization for Some Metal ion Complexes with 2-Hydroxy-3-((5-Mercapto-1,3,4-Thiadiazol-2-yl)Diazenyl)-1-Naphthaldehyde
...Show More Authors

New metal ion complexes were synthesized with the general formula; K[PtLCl4], [ReLCl4] and K[ML(Cl)2] where M = Pd(II), Cd(II), Zn(II) and Hg(II), from the Azo ligand (HL) [2-Hydroxy-3-((5-mercapto-1,3,4-thiadiazol-2-yl)diazenyl)-1-naphth aldehyde] (HL) the ligand was synthesized from (2-hydroxy-1-naphthaldehyde) and (5-amino-1,3,4-thiadiazole-2-thiol). The ligand and its metal complexes are characterized by phisco- chemical spectroscopic techniques (FT.IR, UV-Vis and Mass spectra, elemental analysis, molar conductivity, Atomic Absorption, Chloride contain and magnetic susceptibility). The spectral data suggest that the (HL) behaves as a bidentate ligand in all complexes. These studies revealed tetrahedral geometries for all metal complexes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
A multivariate Bayesian model using Gibbs sampler with real data application
...Show More Authors

In many scientific fields, Bayesian models are commonly used in recent research. This research presents a new Bayesian model for estimating parameters and forecasting using the Gibbs sampler algorithm. Posterior distributions are generated using the inverse gamma distribution and the multivariate normal distribution as prior distributions. The new method was used to investigate and summaries Bayesian statistics' posterior distribution. The theory and derivation of the posterior distribution are explained in detail in this paper. The proposed approach is applied to three simulation datasets of 100, 300, and 500 sample sizes. Also, the procedure was extended to the real dataset called the rock intensity dataset. The actual dataset is collecte

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref