Preferred Language
Articles
/
jxbhCocBVTCNdQwCeDId
G2Way A Backtracking Strategy for Pairwise Test Data Generation
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Data Analysis Techniques And Strategies
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 05 2016
Journal Name
Wireless Communications And Mobile Computing
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation
...Show More Authors

Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati

... Show More
View Publication
Scopus (31)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
MAGNETO HYDRODYNAMIC NATURAL CONVECTION FLOW ON A VERTICAL CYLINDER WITH A PRESENCE OF HEAT GENERATION AND RADIATION
...Show More Authors

The present work investigates the effect of magneto – hydrodynamic (MHD) laminar natural convection flow on a vertical cylinder in presence of heat generation and radiation. The governing equations which used are Continuity, Momentum and Energy equations. These equations are transformed to dimensionless equations using Vorticity-Stream Function method and the resulting nonlinear system
of partial differential equations are then solved numerically using finite difference approximation. A thermal boundary condition of a constant wall temperature is considered. A computer program (Fortran 90) was built to calculate the rate of heat transfer in terms of local Nusselt number, total mean Nusselt number, velocity distribution as well as te

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 08 2009
Journal Name
Ibn Al- Haitham J. For Pure & Appl. Sci.
Evaluation of Dot. ELISA test for Diagnosis Visceral Leishmaniasis in Infected Children
...Show More Authors

Evaluation of Dot. ELISA test for Diagnosis Visceral Leishmaniasis in Infected Children

Publication Date
Sun Jul 03 2016
Journal Name
Journal Of Educational And Psychological Researches
The exploratory and Confirmatory Factorial structure for Riso-Hadson enneagram test indicator
...Show More Authors

This  investigation was conducted to recognize the structure for (RHETI version 2.5  1999) by using exploratory and confirmatory factor analysis. Sample of (620) student of Al-Mustansrya University were administered the (RHETI).

The data of their responses was analyzed by using (PAF) and oblique rotating .

The findings explored (9) factors as one factor for each type and (184) items were loaded by the factors: (60) item for feeling center, (61) items for instinctive center and (63) items for thinking center.

Results of confirmatory factorial analysis supported a model designed by the researcher depended upon a theoretical views of Riso and Hudson

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 12 2024
Journal Name
Journal Mustansiriyah Of Sports Science
Standardization test for the measurement of offensive basketball composite skills(16) years
...Show More Authors

Summary of the researchThe style of playing in basketball, represented by the performance of complex movements as a result of the rapid movement and changing positions is one of the advantages of this game, which adds beauty and excitement to this game, so it was necessary for players to use forms of mobility and complex skills mixed with precision and speed, In the attack to overcome the difficult positions defenders are trying to impose on the attacking team.Complex offensive skills in basketball are difficult skills that a player can not easily perform so they need to be specially trained to handle those situations so that the player can use them in difficult situations.The research community represented a sample of Baghdad players for t

... Show More
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Arobust Hotelling-T2 test"
...Show More Authors

This research work as an attempt has been made to find robust estimations for Hotelling-T2 test when the data is from amultivariate normal distribution and the sample of the multivariate contain outliers also this research gives an easily high breakdown point robust consistent estimators of multivariate location and dispersion for multivariate analysis by using two types of robust estimators, of these methods are minimum covariance determinant estimator and reweighted minimum covariance determinant estimator.

View Publication Preview PDF
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
Some NONPARAMETRIC ESTIMATORS FOR RIGHT CENSORED SURVIVAL DATA
...Show More Authors

The using of the parametric models and the subsequent estimation methods require the presence of many of the primary conditions to be met by those models to represent the population under study adequately, these prompting researchers to search for more flexible parametric models and these models were nonparametric, many researchers, are interested in the study of the function of permanence and its estimation methods, one of these non-parametric methods.

For work of purpose statistical inference parameters around the statistical distribution for life times which censored data , on the experimental section of this thesis has been the comparison of non-parametric methods of permanence function, the existence

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref