Discriminant analysis is a technique used to distinguish and classification an individual to a group among a number of groups based on a linear combination of a set of relevant variables know discriminant function. In this research discriminant analysis used to analysis data from repeated measurements design. We will deal with the problem of discrimination and classification in the case of two groups by assuming the Compound Symmetry covariance structure under the assumption of normality for univariate repeated measures data.
... Show More
Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show MoreThere is an assumption implicit but fundamental theory behind the decline by the time series used in the estimate, namely that the time series has a sleep feature Stationary or the language of Engle Gernger chains are integrated level zero, which indicated by I (0). It is well known, for example, tables of t-statistic is designed primarily to deal with the results of the regression that uses static strings. This assumption has been previously treated as an axiom the mid-seventies, where researchers are conducting studies of applied without taking into account the properties of time series used prior to the assessment, was to accept the results of these tests Bmanueh and delivery capabilities based on the applicability of the theo
... Show MoreThe formation of a Schiff-base with N2O2 donor atoms derived from the hydrazine segment and its metal complexes are reported. The Schiff-base ligand; N’-((1R,2S,4R,5S,Z)-2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-ylidene)furan-2-carbohydrazide (HL) was prepared from the reaction of furan-2-carbohydrazide with (1R, 2R, 4R, 5S)-2,4-diphenyl-3-azabicyclo[3.3.1]nonan-9-one (M1) in ethanol medium. The reaction of the title ligand with selected metal ions Cr(III), Mn(II), Ni(II), Cu(II), Zn(II) and Cd(II) gave complexes with the general formula [M(L)Cl2], (where: M = Cr(III), Mn(II), Ni(II), Cu(II), Zn(II) and Cd(II)). Spectroscopic analyses Fourier transform infrared (FT-IR), Nuclear Magnetic Resonance (NMR) Carbon-13 nuclear magnetic res
... Show MoreThe technology of reducing dimensions and choosing variables are very important topics in statistical analysis to multivariate. When two or more of the predictor variables are linked in the complete or incomplete regression relationships, a problem of multicollinearity are occurred which consist of the breach of one basic assumptions of the ordinary least squares method with incorrect estimates results.
There are several methods proposed to address this problem, including the partial least squares (PLS), used to reduce dimensional regression analysis. By using linear transformations that convert a set of variables associated with a high link to a set of new independent variables and unr
... Show MoreThe aim of this paper is to estimate the concentrations of some heavy metals in Mohammed AL-Qassim Highway in Baghdad city for different distances by using the polynomial interpolation method for functions passing from the data, which is proposed by using the MATLAB software. The sample soil in this paper was taken from the surface layer (0-25 cm depth) at the two sides of the road with four distances (1.5, 10, 25 and 60 m) in each side of the road. Using this method, we can find the concentrations of heavy metals in the soil at any depth and time without using the laboratory, so this method reduces the time, effort and costs of conducting laboratory analyzes.
The aim of this paper is to estimate the concentrations of some heavy metals in Mohammed AL-Qassim Highway in Baghdad city for different distances by using the polynomial interpolation method for functions passing from the data, which is proposed by using the MATLAB software. The sample soil in this paper was taken from the surface layer (0-25 cm depth) at the two sides of the road with four distances (1.5, 10, 25 and 60 m) in each side of the road. Using this method, we can find the concentrations of heavy metals in the soil at any depth and time without using the laboratory, so this method reduces the time, effort and costs of conducting laboratory analyzes.
Polyethersulfone (PES) ultrafiltration membrane blending NaX zeolite crystals as a hydrophilic additive was examined for zinc (II) and lead ions Pb (II) removal from aqueous solutions. The effect of NaX zeolite content on the permeation flux and removal efficiency was studied. The results showed that adding zeolite to the polymer matrix enhanced the permeation flux. The permeation flux of all the zeolite/PES matrix membranes was higher than the pristine membrane. No significant improvement was observed in the removal of Zn (II) ions using all prepared membranes as the removal percentage did not raise above 29.2%. However, the removal percentage of Pb (II) ions was enhanced to 97% using a membrane containing 0.9%wt. zeolite. Also, it was
... Show MoreThe dramatic decrease in the cost of genome sequencing over the last two decades has led to an abundance of genomic data. This data has been used in research related to the discovery of genetic diseases and the production of medicines. At the same time, the huge space for storing the genome (2–3 GB) has led to it being considered one of the most important sources of big data, which has prompted research centers concerned with genetic research to take advantage of the cloud and its services in storing and managing this data. The cloud is a shared storage environment, which makes data stored in it vulnerable to unwanted tampering or disclosure. This leads to serious concerns about securing such data from tampering and unauthoriz
... Show More