In this paper we proposed a new method for selecting a smoothing parameter in kernel estimator to estimate a nonparametric regression function in the presence of missing values. The proposed method is based on work on the golden ratio and Surah AL-E-Imran in the Qur'an. Simulation experiments were conducted to study a small sample behavior. The results proved the superiority the proposed on the competition method for selecting smoothing parameter.
The research addresses the importance of reading and writing for sura Al-alaq and Al-qalam as they represent the main sources for all the sciences as well as ethical values. The researcher seeks to define the educational and ethical values in these two texts which related to reading and writing. To do this, the author went through different relevant literature to show the similarities and related points between them, she also shows the significant of reading and writing and the learning and teaching worth to be consider. The result revealed that the both texts assert on the educational and ethical values, and the vital role of reading and writing.
This article discusses the change of values in urban family, because of various communication media and modern technologies as one of the most important factors affecting the changing family values in urban areas, this means becoming part of urban life. And focuses on the family in urban areas, for the privacy of the social, economic, demographic and cultural help to this effect, and because cities are the most friction and interaction with modern technologies.
The current research deals with studying the aesthetics of symbolic values in the design of internal spaces and their connotations through their existence as a material value, as well as the symbolic meanings and their connotations that touch the spiritual and emotional side of the human being as an intangible value, and the research included four chapters, so the research problem was embodied by the following question (What is the role of values Symbolism and aesthetics in the design of interior spaces)? Therefore, the aim was to clarify the role of symbolic values and their aesthetics in the design of internal spaces. The first chapter included the importance of research, the need for it, the limits of the research and its terminology.
... Show MoreThe avoidance of failure in construction projects is not an easy task, which makes the failure of the construction project to achieve its objectives a major problem experienced by all countries in the world, especially Iraq. Where nearly two-thirds of the construction projects in the world have been suffered by significant problems as an increase in the cost of the project, delay in the specified duration for execution, and stopping the project. Therefore it is required to study and apply new methods for managing the construction project to ensure its success and achieve its objectives. The aim of this study is to study the Agile project management method and its impact on the construction project. In addition, to identi
... Show MoreGray-Scale Image Brightness/Contrast Enhancement with Multi-Model
Histogram linear Contrast Stretching (MMHLCS) method
The study aimed to assess the frequency of invasive fungal infection in patients with respiratory diseases by conventional and molecular methods. This study included 117 Broncho alveolar lavage (BAL) samples were collected from patients with respiratory disease (79 male and 38 female) with ages ranged between (20-80) years, who attended Medicine Baghdad Teaching hospital and AL-Emamain AL-Khadhymian Medical City, during the period from September 2019 to April 2020. The results in PCR versus culture methods in this study showed that out of 117 samples of fungal infections 30(25.6 %) were detected by culture method, while the 24(20.5%) samples were detected by PCR technique, the most commonly diagnosed pathogenic fungi is Candida spp.
... Show MoreThe fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal's triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely develo
... Show MoreBackground: The change in the concepts of cavity preparation and the development of reliable adhesive materials lead to the development of alternative methods of caries removal. Chemo-mechanical caries removal (CMCR) involves the chemical softening of carious dentin, followed by its removal with manual excavation. The present study was conducted to evaluate clinically the efficiency of caries removal using a new chemo-mechanical agent (Papacarie) compared to the conventional drilling method in reduction of total bacterial count. Material and methods: The study is a split mouth design. The sample composes from sixty mandibular deciduous molars teeth in thirty children, between six to nine years of age with bilateral class I deep occlusal car
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More