2022-08-11T13:37:53Z
https://csm.iraqjournals.com/?_action=export&rf=summon&issue=12887
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Hybrid Approach to Detect Spam Emails using Preventive and Curing Techniques
Dheyab Salman Ibrahim
A file that has to be moved between two schemes can be moved through the network. Security needed between the sender and the receiver. Electronic mails are fastest way of communication and information sharing, but in new years, Email system has been changed, which known Spam Mails. Spam is information, which is spread to a big number of receivers without telling them. Now, a number of techniques have been proposed to stop spam. Filters for anti-spam can be worked in two methods: Preventive techniques and Curing Techniques; The Preventive techniques are Stop Spam before delivery which are depend on URL Based and List Based. Such as whitelisting, blacklisting. The Curing Technique is Destination Spam Filtering that used is Content Based Filtering. The Curing Technique, the messages are categorized as Spam or not Spam based on these techniques. Such as Bayesian filtering, keyword-based filtering, heuristic-based filtering, etc. In this study introduce combining preventive techniques and curing
techniques to get good algorithm.
Spam
Unsolicited Commercial e
mail
Bayesian Classifier
Black Listing
White Listing
preventive techniques
curing techniques
2018
12
01
16
24
https://csm.iraqjournals.com/article_162523_dcdc44d0d4c8114235634f0148b55923.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Three-dimensional Face Reconstruction using 3D Morphable Model Fitting Method
Shaimaa H. Shaker
Najlaa Abd Hamza
In this paper, the reconstruction of faces in the form of a 3D model from unconstrained images (different in pose) has been studied. Three-dimensional Morphable Model(3DMM)
Fitting method has been used in 3D reconstruction techniques. In this paper propose improvement of the 3DMM fitting procedure to get accurate 3D model by taking best 2D
landmark of all images rather than taking only first 2D image landmark (traditional method which proposed by A.Bas et al). The results of the proposed algorithm show its
very encouraging as far as execution time and quality of reconstruction as shown in compare the improvement fitting process with the traditional method.
2018
12
01
25
37
https://csm.iraqjournals.com/article_162524_dc58dd8eb2cfc384de669824b7b47042.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
New Results on Soft Spectral in Soft Banach Algebra
Hayder K. Mohammed
Noori F. Al-Mayahi
In this paper, concepts of soft character, soft division algebra, soft ideal, soft
maximal ideals are introduced .Soft Spectral Radius Formula are introduced and
proved, some properties of Soft gelfand algebra are proved.
oft spectrum
soft spectral radius
soft ideal
soft maximal ideal
soft character
soft regular
2018
12
01
1
7
https://csm.iraqjournals.com/article_162525_2c3e6f76dbf6e85fd9cc05b4a857b5b7.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
On Differential Sandwich Theorems of Meromorphic Univalent Functions
Rajaa Ali Hiress
Waggas Galib Atshan
By using of linear operator, we obtain some Subordinations and superordinations
results for certain normalized meromorphic univalent analytic functions in the in the
punctured open unit disk Also we derive some sandwich theorems .
Analytic Function
Differential subordination
Hadamard Product
Meromorphic Univalent Function
2018
12
01
8
15
https://csm.iraqjournals.com/article_162526_9466c8488e18251cc9c3d7fd1ad93205.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Proof of Stronger Goldbach Conjecture
Wildan Waleed Mahmood
The stronger (binary) Goldbach conjecture expresses that "every even integer greater
than or equal to can be written as a sum of two odd prime numbers". The introduce
paper demonstrates this conjecture by proven that there exists a positive integer for each
integer number such that and are simultaneously primes.
Number theory
Primes and their distribution
Goldbach conjecture
2018
12
01
16
19
https://csm.iraqjournals.com/article_162527_5f031fa2617ba38ab2029a72aab52775.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Coefficient Estimates for Subclasses of Bi-Univalent Functions
Waggas Galib Atshan
Rajaa Ali Hiress
In the present paper, we introduce two new subclasses of the class consisting of analytic and
bi-univalent functions in the open unit disk . Also, we obtain the estimates on the TaylorMaclurin coefficients | | and | | for functions in these subclasses. We obtain new special
cases for our results.
Analytic function
Univalent function
univalent function
Coefficient estimates
2018
12
01
20
26
https://csm.iraqjournals.com/article_162528_594b2ec285b10c665243cf23bcd76208.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Properties of Compact fuzzy Normed Space
Jehad R. Kider
Noor A. Kadhum
In this paper we recall the definition of fuzzy norm then basic properties of fuzzy
normed space is recalled after that we introduced the definition of compact fuzzy
normed space. Then basic properties of compact fuzzy normed space is proved.
Fuzzy normed space
fuzzy continuous operator
Uniform fuzzy continuous operator
Compact fuzzy normed Space
2018
12
01
27
34
https://csm.iraqjournals.com/article_162529_903aa62c9689bccf7fdd6d9be74358c7.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Generalizing of Finite Difference Method for Certain Fractional Order Parabolic PDE’s
Eman Hassan Ouda
Madeha Shaltagh Yousif
Ahmed Mohamed Shukur
Raghad Kadhim Salih
Space-time fractional differential equation with integral term (S-TFDE) has been considered.
The finite difference method (implicit and explicit) combined with the trapezoidal integration formula has been
used to
find special formula to solve this equation. The stability and convergence have been discussed. The effect of
adding an
integral term to the common classical equation has been considered. Graphical representation of the calculate
solutions
(obtained by the explicit and the implicit methods) for three numerical examples with their exact solution, are
considered. All the calculations and graphs are designed with the help of MATLAB.
fractional order PDE
fractional itegro
differential equation
fractional Parabolic
2018
12
01
41
53
https://csm.iraqjournals.com/article_162530_9ca3f67152b7b22b8f0e0f12756c4e94.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Certain Types of Complex Lie Group Action
Ahmed Khalaf Radhi
Taghreed Hur Majeed
The main aim in this paper is to look for a novel action with new properties on from the
, the Literature are concerned with studying the action of of two
representations , one is usual and the other is the dual, while our interest in this work is focused on some actions
on complex Lie group[10] . Let G be a matrix complex group , and is representation of In this study we
will present and analytic the concepts of action of complex group on We recall the
definition of tensor product of two representations of group and construct the definition of action of
group on , then by using the equivalent relation ( ) between and
, we get a new action : – The two actions
are forming smooth representation of [ ] [ ] This we have new action which called
denoted by which acting on
( (( ) ) ( ))
This is smooth representation of The theoretical Justifications are developed and prove supported by
some concluding remarks and illustrations.
Hom
Space
Tensor Product
Action of Lie Group
Complex Lie Group
2018
12
01
54
62
https://csm.iraqjournals.com/article_162531_0f8251b98af49032d9c33a912c6ac5f2.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Anti – fuzzy AT – ideals of AT – algebras
Areej Tawfeeq Hameed
Ahmed Hamza Abed
Baieda Hassan Hadi
In this paper , we introduce the notion of in , several
appropriate examples are provided and their some properties are investigated. The image and
the inverse image of in are defined and how
the of in become anti-fuzzy AT-ideals are studied. Moreover, the Cartesian Product of anti-fuzzy AT-ideals are given.
Ideal
anti
fuzzy AT
ideals
image and pre
image of anti
2018
12
01
63
72
https://csm.iraqjournals.com/article_162532_300726b13899eca3679d2ade2b05c28a.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Trivial Extension of Armendariz Rings and Related Concepts
Maiada N. Mohmmedali
Areej M. Abduldaim
Anwar Khaleel Faraj
This paper investigate the possibility of inheriting the properties of the ring R to the trivial extension ring
R(R,R) and present the relationship between the trivial extension R(R,R) and many types of rings. The concepts
of 2-primal, reversible, central reversible, semicommutative, nil–semicommutative, π-Armendariz and central
π-Armendariz rings are studied with trivial extension R(R,R) and some characterizations of -Armendariz and
central π-Armendariz rings are given.
Trivial extension
Armendariz
nil
central
2018
12
01
73
79
https://csm.iraqjournals.com/article_162533_d05ba9ef5679e8fa008ea74d0d467671.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Topology Fuzzy Normed Algebra
Noori F. Al-Mayahi
Suadad M. Abbas
In this paper, we deal with the basic concepts in topology on fuzzy normed algebra, such as the balls open and
balls closed. Next, we study their properties. Furthermore, the concept of derived and closure are discussed.
Fuzzy field
fuzzy vector space
fuzzy normed space
fuzzy normed algebra
2018
12
01
35
40
https://csm.iraqjournals.com/article_162534_7e40e13386e97509bf9320c80e93093e.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Analysis of Heat and Mass Transfer in a Tapered Asymmetric Channel During Peristaltic Transport of (Pseudoplastic Nanofluid) with Variable Viscosity Under the Effect of (MHD)
Mohammed R. Salman
Ahmed M. Abdulhadi
In this paper, a study and an analysis of a heat and mass transfer during peristaltic flow for a pseudoplastic
fluid in asymmetric tapered channel, and a variable viscosity dependent of a fluid temperature with exist of slip
conditions through porous medium and the influence of this conditions on the velocity and pressure, where the
wavelength of the peristaltic flow is a long and the Reynold number is very small. The solution of equations for
the momentum and energy have been on the basis of a perturbation technique for a found the stream function,
velocity, pressure gradient and temperature and also have been discussed the trapping phenomenon by the graphs.
Peristaltic transport
Reynolds number
Hartmann number
pseudoplastic
Porous Medium
2018
12
01
80
96
https://csm.iraqjournals.com/article_162535_bc6226e9c463cf31591e8c4cc6c32ca1.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Permuting Jordan Left Tri – Derivations On Prime and semiprime rings
Mazen O. Karim
Let R be a 2 and 3 – torsion free prime ring then if R admits a non-zero Jordan left tri- derivation
B : R × R × R____ R , then R is commutative ,also we give some properties of permuting left tri - derivations
prime ring
semiprime ring
left tri
derivation
Jordan left tri
derivations
2018
12
01
97
102
https://csm.iraqjournals.com/article_162536_bf805519f722e44b3b48f7e3474ef28c.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
The new exponential identities
Mohammed Abdulla Saeed Salem
We have obtained new exponential identities. By ten original propositions we have proved them.
Identities
Pascal
Binomial coefficients
2018
12
01
103
107
https://csm.iraqjournals.com/article_162537_1ade1ce575b2aed094f0fd05130b781a.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
On the NBC-Bases of product hypersolvable arrangements
Mayadah Abd Ulrazaq
This paper aims centered around the product of hypersolvable arrangements by using the hypersolvable partition analogue by proving that each of
A and B are hypersolvable if A × B is a hypersolvable, also each of A and B are supersolvable if A × B is supersolvable. Moreover, this paper show how to prove that the dimension of the first non-vanishing higher homotopy groups of the complement M(A × B) is p(A × B)× min{p(A), p(B)}.
Hypersolvable
Supersolvable
Hypersolvable arrangements
2018
12
01
108
117
https://csm.iraqjournals.com/article_162538_1bc45453beba28088a9d0d38aef6b5f5.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Some Properties of Random Fixed Points and Random Periodic Points for Random Dynamical Systems
Sundus Talib Mohsin
Ihsan Jabbar Kadhim
Our aim in this paper is to give some properties for random fixed points for random
dynamical systems where we give the characteristic of random fixed points in terms of the
random trajectory emanating from random variable and give. Also, the concept of random
periodic points for random dynamical systems is studied where the sufficiently and necessarily
conditions which make the random variable random periodic point for random dynamical
systems. Also the authors prove that the set of all (continuous) random periodic points under
certain conditions is P-closed.
Random dynamical system
random fixed point
random periodic point
2018
12
01
118
126
https://csm.iraqjournals.com/article_162539_806792d5195d3d3f06212398dba68727.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Exact Solutions for nonlinear partial differential equation by modified F-expansion method
Najla.A.AL-Khairullah
Mazin.H.suhhiem
In this Paper, we use modified F-expansion method to construct new exact traveling wave solutions of nonlinear partial differential equation, The (2+1) – dimensional zoomeron equation, The obtained solutions include soliton – like solutions, trigonometric function solutions, rational solutions and exponential solutions.
2018
12
01
127
131
https://csm.iraqjournals.com/article_162540_9f9f7ee08b5fc5c0e8cf44e6074dae83.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
On Minimal and Maximal T1 –space Via Β* c-open set
Raad Aziz Hussan Al-Abdulla
Karim Fadhil Al-Omri
In this paper, we introduced study about properties of the spaces minimal T1 – Space and maximal T1 – space by using the set open (respace β - open, Β* c– open) sets and we concluded some propositions, remarks and relations between spaces m Β* c – T1 space and M Β * c – T1 space and study the relation between m – space and M – space to space T1 – space. Where we find every m Β* c – T1 space is M Β* c – T1 space, but the converse is not true in general. Also we introduced hereditary properties and topological properties.
minimal
2018
12
01
132
140
https://csm.iraqjournals.com/article_162541_d42d1602399bd9da22289d6d168f08cd.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
A Class of Small Injective Modules
Akeel Ramadan Mehdi
Let R be a ring. In this paper, a right R-module M is defined to be AS-injective if Ext1 (R ⁄K, M )=0 , for any annihilator-small right ideal K of R . We characterize rings over which every right module is AS-injective. Conditions under which the class of AS-injective right R-modules (ASIr ) is closed under quotient (resp. pure submodules, direct sums) are given. Finally, we study the definability of the class ASIr.
Injective module
Definable class
small right ideal
Pure submodule
2018
12
01
141
150
https://csm.iraqjournals.com/article_162542_3d018661d47ba9ad99c3d4a60a209213.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Design and Construct Intelligent Tank “Water Level Sensor”
Baraa I. Farhan
The system proposed in this paper design a system of intelligent reservoir " water level sensor" helps reduce thewaste percentage of water. Through the automatic control and control of the water level by determining the water proportion of the reservoir in terms of emptiness and fullness and is carried out using the concept of artificial intelligence with micro controls, where the use of a simple and cheap control is arduino and is stored and stored information is written in IDL program to determine the percentage of fullness and lack Depending on the need of the user of the reservoir with the management of electronic parts associated with the Arduino to fill the tank when it is free of water and stop the filling process when reaching the specified level of fullness while monitoring the level of water during use. This system can be applied at the level of tanks reservoirs Cities and irrigation tanks and reservoirs for agricultural land with the development of electronic parts used in the control system to achieve the desired goal in preserving the amount of safe water for drinking and non-potable.
Water Tank
Arduino
Microcontroller
Control System
Water Level Sensor
2018
12
01
1
8
https://csm.iraqjournals.com/article_162543_97a3b946b66b5fac80d72047ba9a0d97.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Estimating the state of website security as poorly regulated mechanisms based on fuzzy logic methods
Yasir Ali Matnee
The research is devoted to the analysis of page loading time, which is an important indicator for any web-site. As a rule, the sites are hosted on web-servers with certain characteristics. The users interact with the environment is largely aggressive and uncertain (external threats such as penetration, denial of service, the introduction of code into the language of structured SQL queries, etc.). It should be noted that there are the uncertainties generated by hardware and software are also important. Any site can be subis
influenced by the influence of the external environment and various subsystems of servicing the functions of web-sites, which leads to occurrence of contingencies and generates uncertainty of his work. The degree of uncertainty is cannot always be assessed on the basis of statistical material alone. This leads to an increase in the number of methods and means of intellectualizing the performance of evaluations on the basis of methods of artificial intelligence, and methods based on the use of fuzzy estimates. The assessment of the security status of Internet sites as poorly formalized objects on the basis of fuzzy logic methods considered in the article is implemented in the form of technology for assessing the states of reliability of a web site. The proposed approach allows a more flexible adaptation to the particular problem and allows diagnosis object already in the step of calculating an integral index of reliability. Flexibility is achieved due to the fact that the state of reliability can be estimated At once on several reliability indicators.
Fuzzy logic
methods of system analysis
metrics
analysis and features of a web
Site
2018
12
01
9
15
https://csm.iraqjournals.com/article_162544_bb698c9432c397a0da51e12eec8cb9a2.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Methods of Secure Routing Protocol in Wireless Sensor Networks
Waleed Kh. Alzubaidi
Shaimaa H. Shaker
The Wireless Sensor networks (WSN) consider an emerging technology that have been greatly employed in critical situations like battlefields and commercial applications such as traffic surveillance, building habitat, smart homes and monitoring and many more scenarios. Security is one of the main challenges that face wireless sensor networks nowadays. While an unattended environment makes the deployment of sensor nodes in the networks more vulnerable to vary of potential attacks, the limitations of inherent power and memory for the sensor nodes makes conventional solutions of the security is unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.
Wireless Sensor Network
Security Goal
Security Attacks
Defensive mechanisms
Challenges
2018
12
01
38
55
https://csm.iraqjournals.com/article_162545_ea9dde9564fb2fe2540880e61c4c94d6.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Identification based Dental Image
Shaimaa Hameed Shaker
Hajer Najah
Identification (matching) system is a recognition and classification form that helps in identifying the identity depending on his/her dental X-Ray image. This work displays a new method to identify a person from his/her dental X-Ray image that is widely used in forensic, border organization, parenting selecting and investigations. The goal of this paper is to design an efficient identification model depending on dental X-Ray image of identities and that can be useful to identify the unknown Individuals who died. The techniques that used were image processing and features extraction techniques which had been added to improve the goal. The best result attained from the dental X-Ray model was 89% as an identification rate.
dental X
ray
identification
recognition
image processing
features extraction
2018
12
01
56
69
https://csm.iraqjournals.com/article_162546_9cb343a208e411e9d65d35250ed435ef.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Security Systems Based On Eye Movement Tracking Methods
Shaimaa Hameed Shaker
Eqbas Ali
Israa Ahmed Abdullah
This survey presents an overview of eye-tracking techniques for various security systems, provides insights into using eye-tracking techniques in security systems. This paper classifies the techniques using some researches. Researches depend on characteristics of eye tracking data, which includes viewer and stimuli aspects, also it does depend on characteristics related to visualization methods. This work contributed in explain some of the security systems that depend on eye gaze tracking, the
consequences, the positive and negative aspects resulting from the use of eye gaze tracking in the security system, presents the strengths and weaknesses to keep in mind in future. The work finally presents a comparison between those security systems for facilitating choose the more accurate and effective system.
Real
time eye tracking
Real
time eye detection
password
gaze
authentication
2018
12
01
70
78
https://csm.iraqjournals.com/article_162547_7419979a779c0c544cf64cfdba749354.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Proposed aspect extraction algorithm for Arabic text reviews
Ahmed bahaa aldeen abdul wahhab
aliaa kareem abdul Hassan
Opinion mining from reviews is a very crucial area in NLP. This area has many applications in social networks, business intelligence, and decision making. Aspect extraction is the main step to achieve opinion mining. This paper proposed an algorithm for aspect extraction from reviews in the Arabic language, to determine the aspects that the reviewers are described in their comments. The proposed algorithm begins with analyzing the comments dataset using latent Dirichlet analysis (LDA) to identify the aspects and its
essential representative words, then extracting nouns and its' adjectives as a possible aspect phrase in a review. After that the categorizing process to categorize the extracted
phrases according to the words specified from LDA analysis. The proposed approach has been tested by using two standard Arabic reviews datasets. The result was auspicious in
spite of the difficulties if the Arabic natural language processing.
Natural language processing
opinion mining
Sentiment Analysis
aspect extraction
latent Dirichlet analysis
LDA
2018
12
01
79
90
https://csm.iraqjournals.com/article_162548_7d9b6b6b7cf77dee9a8ea98a79785a08.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Design of keystream Generator utilizing Firefly Algorithm
Mohammed Salih Mahdi
Nidaa Flaih Hassan
Stream cipher is one of encryption procedures for sending data in internet; stream cipher is suitable in telecommunications and real-time apps. The robustness measurement of stream cipher is according to the randomness of keystream that is utilized. If the random series of keystream generator is low, the keystream of stream cipher can be read and encrypted data by stream cipher become vulnerable to attackers. This paper utilizes Firefly Algorithm based Local Key Generation for generation keystream. The generated keystream is independent of original messages. The randomness of keystream series of Firefly passing the five standard criteria. The suggested keystream generator is wordestablished appropriated to fast real-time apps than are bit-established linear stream ciphers. Furthermore, the suggested keystream generator satisfies the three demands of benchmarks such as maximum correlation, robust randomness and huge complexity.
stream cipher
keystream Generator
Firefly Algorithm
Local Keys Function
2018
12
01
91
99
https://csm.iraqjournals.com/article_162549_331eb890a0d6f523c5836216e951a3e6.pdf
Journal of Al-Qadisiyah for Computer Science and Mathematics
2074-0204
2074-0204
2018
10
3
Forecast the exchange rate of the Iraqi dinar against the US dollar using different versions of GARCH models.
Muhammad H. Al-Sharoot
Omar M. Alramadhan
There are many time series that are characterized by large variability, which makes them suffer from the problem of heterogeneity of contrast clearly, Where
the time series analysis requires the homogeneity of variance for this purpose was the study and review of some important models used in dealing with the time
series heterogeneous in contrast, a GARCH, ARMA-GARCH,TGARCH, EGACH , When the distribution of errors follows the normal distribution which was discovered by Engle since 1982, The aim of this study was to forecast . This study aimed at forecasting the exchange rates of the Iraqi dinar against the US dollar for the period from 2010 to 2018 through an analysis of fluctuations in the exchange rate series. The application of the studied data showed that the best model for predicting volatility is ARMA (0-1) -GARCH 2.1) based on some
criteria for selecting the AIC, SIC, H-QIC and the significance of the estimated model parameters
heterogeneity of variance
yield chain
GARCH
EGARCH
TGARCH
ARMA
AIC
SIC
QIC
2018
12
01
1
13
https://csm.iraqjournals.com/article_162550_5e9260701f396c764ea812d58e3386d5.pdf