Preferred Language
Articles
/
jeasiq-1184
Comparison Between Ordinary Method and Robust Method to estimate the Parameters of the Univariate Mixed Model with Low Order
...Show More Authors

A condense study was done to compare between the ordinary estimators. In particular the maximum likelihood estimator and the robust estimator, to estimate the parameters of the mixed model of order one, namely ARMA(1,1) model.

Simulation study was done for a varieties the model.  using: small, moderate and large sample sizes, were some new results were obtained. MAPE was used as a statistical criterion for comparison.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
The mechanisms of the actor's work between performance and directing style in the contemporary theater show (Western) as a model
...Show More Authors

The actor has mechanisms that were applied in the performance، as it formed a style in the theatrical form (weird)، and the researcher deliberately studied these mechanisms and divided them into four chapters.

The researcher divided it into two sections، the first is the actor's performance requirements، and the second is the boring performance methods in the directors' theater، and then the researcher concluded the second chapter with the most important indicators.

As for the third chapter، the researcher determined the society of his research and the method of selecting the sample (strange) and analyzing the sample and concluded with the most important results of the sample analysis.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the Shapiro-Wilk test Jureckova test using simulation and multiple distributions
...Show More Authors

 إن المقصود باختبارات حسن المطابقة هو التحقق من فرضية العدم القائمة على تطابق مشاهدات أية عينة تحت الدراسة لتوزيع احتمالي معين وترد مثل هكذا حالات في التطبيق العملي بكثرة وفي كافة المجالات وعلى الأخص بحوث علم الوراثة والبحوث الطبية والبحوث الحياتية ,عندما اقترح كلا من   Shapiro والعالم Wilk  عام 1965 اختبار حسن المطابقة الحدسي مع معالم القياس
(

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Scienceasia
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator
...Show More Authors

In this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
The dialectical relationship between the organization's growth and its value under the framework of the diversification strategy
...Show More Authors

The research is conducted on target of investigating the role of growth strategy via diversification in value maximization of a firm in terms of controversies literatures had witnessed. Using a descriptive approach for analyzing and verifying the harmony of variables of research and their conceptualized logic , it could be reached to many conclusions agreed in their essence upon that the related diversification has the major role in value maximization of a firm and the wealth of its owners .                       

View Publication Preview PDF
Crossref
Publication Date
Sat Sep 27 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison between powerful Waterpik flosser with dental floss as an adjunct to tooth brushing
...Show More Authors

Background: Removing dental plaque is important to maintain a good oral hygiene and prevent periodontal disease; this could not be accomplished by the use of toothbrush alone, it needs the help of interdental aids or intra-oral irrigator devices. The aim of this study was to compare the effect of using Waterpik flosser as adjunct to tooth brushing than using the dental floss with the brushing. Materials and methods: A single blind, six weeks study included 45 subjects divided into three groups of 15 subjects at each group. Group B (brushing) was instructed to use the toothbrush only, group BF (brushing & flossing) was instructed to use dental floss and tooth brushing while group BW (brushing and Waterpik flosser) was instructed to use Water

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
The Romantic Nightingale between Coleridge’s Divergence and Keats’ Adherence: A comparative Study between Coleridge’s ‘The Nightingale’ and Keats’ ‘Ode to a Nightingale’
...Show More Authors

‘Ode to a Nightingale’(1819) is a typical poem of a Romantic poet like John Keats, but
‘The Nightingale’(1798) is an uncharacteristic poem of a Romantic poet like Coleridge.
The paper proposes a comparison between Coleridge’s ‘The Nightingale’ and Keats’
‘Ode to a Nightingale’.Coleridge’s poem diverges from the Romantic norm; it carries some
characteristics new to Romantic poetry like the realistic and objective portrayals of nature and
the nightingale, while Keats’ poem adhere to the characteristics of Romantic poetry; it
portrays nature and the nightingale subjectively and unrealistically. Coleridge’s poem is very
much influenced by the scientific approaches to environment, and natural his

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Semi-parametric Methods in Partial Linear Single-Index Model
...Show More Authors

The research dealt with a comparative study between some semi-parametric estimation methods to the Partial linear Single Index Model using simulation. There are two approaches to model estimation two-stage procedure and MADE to estimate this model. Simulations were used to study the finite sample performance of estimating methods based on different Single Index models, error variances, and different sample sizes , and the mean average squared errors were used as a comparison criterion between the methods were used. The results showed a preference for the two-stage procedure depending on all the cases that were used

View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Iraqi Journal Of Science
Using the band ratio classification method to detect the regions that need to remove sedimentation in Tigris River
...Show More Authors

LandSat Satellite ETM+ image have been analyzed to detect the different depths of regions inside the Tigris river in order to detect the regions that need to remove sedimentation in Baghdad in Iraq Country. The scene consisted of six bands (without the thermal band), It was captured in March ٢٠٠١. The variance in depth is determined by applying the rationing technique on the bands ٣ and ٥. GIS ٩. ١ program is used to apply the rationing technique and determined the results.

View Publication