We have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.
The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F
... Show MoreThis study has been accomplished by testing three different models to determine rocks type, pore throat radius, and flow units for Mishrif Formation in West Qurna oilfield in Southern Iraq based on Mishrif full diameter cores from 20 wells. The three models that were used in this study were Lucia rocks type classification, Winland plot was utilized to determine the pore throat radius depending on the mercury injection test (r35), and (FZI) concepts to identify flow units which enabled us to recognize the differences between Mishrif units in these three categories. The study of pore characteristics is very significant in reservoir evaluation. It controls the storage mechanism and reservoir fluid prope
Purpose: To identify the size of the food gap for the main agricultural products and crops in Iraq, which reflects to us the extent to which agricultural production in particular and the agricultural sector in general have declined.Theoretical framework: The theoretical side of the research dealt with the definition of self-sufficiency and the food gap, as well as identifying the reality of agricultural production in Iraq during the study period, as well as the reality of the food gap for the most important agricultural, plant and animal products.Design/methodology/approach: In reviewing the research problem, the researcher adopted the method of deductive and descriptive analysis based on the presentation and detail of official data
... Show MoreThe objective of the study was to identify the effectiveness of a training program based on the employment of the educational portal in the development of the skills of the administrative body in the basic education schools in Dhofar Governorate. To achieve the goal, a training program was designed that includes the skills of the educational portal to be met by the administrative body and measuring its effectiveness. A questionnaire to identify training needs, and a notecard to evaluate performance. The study sample consisted of (70) individuals of the administrative staff. The researchers used the descriptive-analytical method to identify the training needs, design and build the training program and the experimental method for applying
... Show MoreThe importance of physical and nonphysical architectural design values made architectural designers need good experience to be experts of architectural values reasonably without neglecting any value in the design process. The importance of such values made that ignoring any values and mistakes occurs in the design process. Simultaneously, architectural designers' different nature and the difference in their experiences are causing different understandings of the design values, thus causing architectural mistakes. The research problem appears from the randomly propagating of mistakes in contemporary architecture, which is about to become a phenomenon in Al Sulaymaniyah city. The research aims to find the main reason
... Show MoreDeixes belong to the field of both semantics and pragmatics as they lie in the edge of these two fields. Pragmatically, they are concerned with the relationship between the structure of a language and the contexts. The present work aims at analyzing the use of deixes using Levinson’s (1983) and Yule's (1996) concept of deixes, where the latter maintained that the referents of the deixes cannot be realized apart from the context where they are used. He added that the contextual information of certain utterances involves information about the participants (the speaker and the addressee), the time and the place. Consequently, a qualitative- descriptive approach has been adopted to meet the objective of the study which reads, “exam
... Show MoreThis work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of
... Show MoreWith the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show More