n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary func
... Show MoreThe region-based association analysis has been proposed to capture the collective behavior of sets of variants by testing the association of each set instead of individual variants with the disease. Such an analysis typically involves a list of unphased multiple-locus genotypes with potentially sparse frequencies in cases and controls. To tackle the problem of the sparse distribution, a two-stage approach was proposed in literature: In the first stage, haplotypes are computationally inferred from genotypes, followed by a haplotype coclassification. In the second stage, the association analysis is performed on the inferred haplotype groups. If a haplotype is unevenly distributed between the case and control samples, this haplotype is labeled
... Show MoreEconomic organizations operate in a dynamic environment, which necessitates the use of quantitative techniques to make their decisions. Here, the role of forecasting production plans emerges. So, this study aims to the analysis of the results of applying forecasting methods to production plans for the past years, in the Diyala State Company for Electrical Industries.
The Diyala State Company for Electrical Industries was chosen as a field of research for its role in providing distinguished products as well as the development and growth of its products and quality, and because it produces many products, and the study period was limited to ten years, from 2010 to 2019. This study used the descriptive approa
... Show Moreالخلفية: العقدية المقيحة المعروفة أيضًا باسم ""(GAS) هي احدى مسببات الأمراض ذات الأهمية الصحية العامة، حيث تصيب 18.1 مليون شخص في جميع أنحاء العالم وتقتل 500000 شخص كل عام. الهدف: حددت هذه المراجعة المقالات المنشورة حول عوامل الخطر واستراتيجيات الوقاية والسيطرة لأمراض المكورات العقدية. المواد والأساليب: تم إجراء بحث منهجي لتحديد الأوراق المنشورة على قواعد البيانات الإلكترونية Web of Science و PubMed و Scopus و Google Scholar في مح
... Show MoreThis study aims to the little impact of accounting financial performance (AFP) analysis on the money market in the Iraqi economy. Potentially limiting future market activity could be international risks and obstacles, which in turn could cause issues and crises (Shah & Jan, 2014; Bakhtiyarovich, 2020). The study concept was inspired by the recognition that there must be communication between the importance of the AFP analysis of the Iraqi securities market and the country’s financial and economic institutions. The sample of the study included ten Iraqi banks listed in the Iraq Stock Exchange (ISE) for the period 2010–2020. The three mathematical models included in the statistical analysis served as the basis for projectin
... Show MoreResearch aims to shed light on the concept of corporate failures , display and analysis the most distinctive models used to predicting corporate failure; with suggesting a model to reveal the probabilities of corporate failures which including internal and external financial and non-financial indicators, A tested is made for the research objectivity and its indicators weight and by a number of academics professionals experts, in addition to financial analysts and have concluded a set of conclusions , the most distinctive of them that failure is not considered a sudden phenomena for the company and its stakeholders , it is an Event passes through numerous stages; each have their symptoms that lead eve
... Show MoreThe Iraqi and Iranian pottery has a significant role in the contemporary world pottery space, despite the fact that influences created those formulation, thus the researcher supposes that there is a relation between the potter and his environment within Iraq's environment and Iran's environment, which are similar at times and different at other times. The researcher, hence, found himself in front of a number of questions:
1- How much was the Iraqi potter inspired by the environment compared to the Iranian potter?
2- Has the Iraqi and Iranian pottery been really inspired by the environment items or there were modified metaphors?
The current research aims at (identifying the influential environmental characteristics in the Iraq
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show More