Preferred Language
Articles
/
jeasiq-1169
Comparison of repetitive estimation methodsSelf-data
...Show More Authors

In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation)  structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of  these procedures and compare them using generated data.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 17 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Estimation the Safety of Parenteral Resveratrol in Mice
...Show More Authors

   Resveratrol is polyphenolic compound has many biochemical and biological effects on several organs. Therefore, resveratrol can be used to treat many diseases. The aim was to evaluate resveratrol safety when used in a parenteral single bolus dose. This study was conducted on 60 mice (30 males and 30 females). Each male and female mice divided into 6 groups (five mice per group). All mice groups given 1% DMSO and five different doses of resveratrol (5, 2.5, 1.25, 0.625, 0.312) gm/kg intraperitonially given to five groups respectively. The mice were continuously monitored during 14 days. The number of deaths, changes in general behavior, changes in physiological activity, and signs of toxicity were reported. On day 15 blood was

... Show More
View Publication Preview PDF
Scopus (8)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Estimation of Surface Runoff to Bahr AL-Najaf
...Show More Authors

The estimation of the amounts of Surface runoff resulting from rainfall in the water basins is of great importance in water resources management. The study area (Bahr Al-Najaf) is located on the western edge of the plateau and the southwestern part of the city center of Najaf, with an area of 2729.4 (km2). The soil and water assessment tool (SWAT) with ArcGIS software was used to simulate the runoff coming from the three main valleys (Kharr (A and B)), Shoaib Al-Rahimawi, and Maleh), that contribute the flow to the study area. The results of the model showed that the SWAT software was successfully simulating the flow conditions based on the coefficient of determination (R2), the Nash coefficient (NS

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Sep 09 2009
Journal Name
University Of Baghdad
Estimation of Reservoir Rock Properties from Well Measurements
...Show More Authors

Porosity and permeability are the most difficult properties to determine in subsurface reservoir characterization. The difficulty of estimating them arising from the fact that porosity and permeability may vary significantly over the reservoir volume, and can only be sampled at well location. Secondly, the porosity values are commonly evaluated from the well log data, which are usually available from most wells in the reservoir, but permeability values, which are generally determined from core analysis, are not usually available. The aim of this study is: First, to develop correlations between the core and the well log data which can be used to estimate permeability in uncored wells, these correlations enable to estimate reservoir permeabil

... Show More
Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Estimation of Bladder pressure by using poiseuilles equation
...Show More Authors

Equation Boizil used to Oatae approximate value of bladder pressure for 25 healthy people compared with Amqas the Alrotinahh ways used an indirect the catheter Bashaddam and found this method is cheap and harmless and easy

View Publication Preview PDF
Publication Date
Fri Nov 01 2024
Journal Name
Baghdad Science Journal
Estimation of Copula Density Using the Wavelet Transform
...Show More Authors

يقترح هذا البحث طريقة جديدة لتقدير دالة كثافة الرابطة باستخدام تحليل المويجات كطريقة لامعلمية، من أجل الحصول على نتائج أكثر دقة وخالية من مشكلة تاثيرات الحدود التي تعاني منها طرائق التقدير اللامعلمية. اذ تعد طريقة المويجات طريقة اوتماتيكية للتعامل مع تاثيرات الحدود وذلك لانها لا تأخذ بنظر الاعتبار إذا كانت السلسلة الزمنية مستقرة او غير مستقرة. ولتقدير دالة كثافة الرابطة تم استعمال المحاكاة لتوليد البي

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Lecture Notes Of The Institute For Computer Sciences, Social Informatics And Telecommunications Engineering
Sensor Data Classification for the Indication of Lameness in Sheep
...Show More Authors

View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Application of Data Mining Techniques on Tourist Expenses in Malaysia
...Show More Authors

Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 23 2016
Journal Name
Computer Science & Information Technology ( Cs & It )
Modelling Dynamic Patterns Using Mobile Data
...Show More Authors

View Publication
Crossref