The high cost of chemical analysis of water has necessitated various researches into finding alternative method of determining portable water quality. This paper is aimed at modelling the turbidity value as a water quality parameter. Mathematical models for turbidity removal were developed based on the relationships between water turbidity and other water criteria. Results showed that the turbidity of water is the cumulative effect of the individual parameters/factors affecting the system. A model equation for the evaluation and prediction of a clarifier’s performance was developed:
Model: T = T0(-1.36729 + 0.037101∙10λpH + 0.048928t + 0.00741387∙alk)
The developed model will aid the predictiv
... Show Moreon the subject of the provisions of recitation among students of the Islamic Sciences Colleges).
The researchers adopted the experimental method and chose an experimental design for the two equivalent groups by post-test. The research sample consisted of (60) male and female students from (second stage) - Department of Qur’an Sciences and Islamic Education - University of Diyala, and the two researchers were rewarded between the two groups of research in the following variables: (Chronological age calculated in months, degrees of recitation rulings subject in the previous year, the two researchers studied the same research groups, and lasted for an entire semester, the researchers prepared the observation card to measure the ru
... Show MoreThe sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ
... Show MoreThe research aims at considering the reality of cognitive bias and organizational inertia as determinants of strategic change in a sample of companies listed in Amman Stock Market. To achieve objectives of the research, a model consisting of two independent variables has been designed, namely:
(1) The cognitive bias resulting from (escalating commitment, analogy, previous assumptions, representative generalization, command and control, convergent thinking), and (2) Organizational inertia due to (Icarus discrepancy, power distribution, rooted organizational culture), and a dependent variable, strategic change in (leadership patterns, strategy, the organization per se).
From the model two main hypotheses were derived;
... Show MoreThe aim of this study is to estimate the parameters and reliability function for kumaraswamy distribution of this two positive parameter (a,b > 0), which is a continuous probability that has many characterstics with the beta distribution with extra advantages.
The shape of the function for this distribution and the most important characterstics are explained and estimated the two parameter (a,b) and the reliability function for this distribution by using the maximum likelihood method (MLE) and Bayes methods. simulation experiments are conducts to explain the behaviour of the estimation methods for different sizes depending on the mean squared error criterion the results show that the Bayes is bet
... Show MoreThe logistic regression model is one of the oldest and most common of the regression models, and it is known as one of the statistical methods used to describe and estimate the relationship between a dependent random variable and explanatory random variables. Several methods are used to estimate this model, including the bootstrap method, which is one of the estimation methods that depend on the principle of sampling with return, and is represented by a sample reshaping that includes (n) of the elements drawn by randomly returning from (N) from the original data, It is a computational method used to determine the measure of accuracy to estimate the statistics, and for this reason, this method was used to find more accurate estimates. The ma
... Show MoreThis study aims to determine the extent to which Palestinian elites use digital diplomacy to confront the Israeli narrative by exploring the motives for usage, patterns, essential digital diplomatic tools, and achieved satisfactions. The study adopted a survey methodology and employed a questionnaire distributed to a sample of 110 Palestinian political and media elites.
The study arrived at several key findings, including: Palestinian elites allocate a substantial (%67) of their efforts towards employing digital diplomacy as a response to the Israeli narrative. The foremost platforms employed for this purpose are Facebook and Twitter. The primary motivation for utilizing these digital platforms is to present
A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.