It is the regression analysis is the foundation stone of knowledge of statistics , which mostly depends on the ordinary least square method , but as is well known that the way the above mentioned her several conditions to operate accurately and the results can be unreliable , add to that the lack of certain conditions make it impossible to complete the work and analysis method and among those conditions are the multi-co linearity problem , and we are in the process of detected that problem between the independent variables using farrar –glauber test , in addition to the requirement linearity data and the lack of the condition last has been resorting to the
... Show MoreSuicidal ideation is one of the most severe mental health issues faced by people all over the world. There are various risk factors involved that can lead to suicide. The most common & critical risk factors among them are depression, anxiety, social isolation and hopelessness. Early detection of these risk factors can help in preventing or reducing the number of suicides. Online social networking platforms like Twitter, Redditt and Facebook are becoming a new way for the people to express themselves freely without worrying about social stigma. This paper presents a methodology and experimentation using social media as a tool to analyse the suicidal ideation in a better way, thus helping in preventing the chances of being the victim o
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIn order for the process of removing pollutants, including dyes, from the aquatic environment to be effective, plant wastes such as banana peels were used as adsorbent surfaces by thermally activating them (ABP) and modifying them with iron oxide nanoparticles (MABP), which were characterized using Fourier transform infrared (FT-IR) and X-ray diffraction (XRD) techniques. They were applied in the field of Janus green (JG) dye adsorption for the batch system and studied the effect of several factors (adsorbent weight, contact time, initial concentration, and temperature). Their data were analyzed kinetically using first- and second-order kinetic models and they were found to follow the second order. Their data were also analyzed thro
... Show MoreIn order for the process of removing pollutants, including dyes, from the aquatic environment to be effective, plant wastes such as banana peels were used as adsorbent surfaces by thermally activating them (ABP) and modifying them with iron oxide nanoparticles (MABP), which were characterized using Fourier transform infrared (FT-IR) and X-ray diffraction (XRD) techniques. They were applied in the field of Janus green (JG) dye adsorption for the batch system and studied the effect of several factors (adsorbent weight, contact time, initial concentration, and temperature). Their data were analyzed kinetically using first- and second-order kinetic models and they were found to follow the second order. Their data were also analyzed thro
... Show MoreAmong more than 200 different human papilloma viral genotypes, the association of low oncogenic risk-HPV genotypes have been recognized with a variety of oral, oropharyngeal, nasopharyngeal benign tumors as well as non-neoplastic polyposis and papillomas and adenoid hypertrophy. This prospective case- control study aims to determine the rate of DNA detection of HPV genotype 6/11 in nasopharyngeal adeno- tonsillar tissues from a group of patients subjected to adenoctomy for adenoid hypertrophy . A total number of nasopharyngeal adeno-tonsillar tissue specimens from pediatric patients with adenoid hypertrophy were enrolled; 40 nasopharyngeal adeno-tonsillar tissues from patients with adenoid hypertrophy, and 20 normal nasal tissue specimen
... Show MoreThe performance quality and searching speed of Block Matching (BM) algorithm are affected by shapes and sizes of the search patterns used in the algorithm. In this paper, Kite Cross Hexagonal Search (KCHS) is proposed. This algorithm uses different search patterns (kite, cross, and hexagonal) to search for the best Motion Vector (MV). In first step, KCHS uses cross search pattern. In second step, it uses one of kite search patterns (up, down, left, or right depending on the first step). In subsequent steps, it uses large/small Hexagonal Search (HS) patterns. This new algorithm is compared with several known fast block matching algorithms. Comparisons are based on search points and Peak Signal to Noise Ratio (PSNR). According to resul
... Show MoreThe: currency Auction is one of the monetary policy tools created after 2003, in order to keep pace with the changes that the monetary and financial policies will witness from financial openness and expectations of high levels of liquidity after international economic restrictions. It is necessary to re-evaluate the work of the currency Auction from time to time and observation its efficiency in adjustment the exchange rate And its reflection on the general level of prices as one of the objectives of its inception, and during the analytical aspect, it was confirmed that the currency Auction for selling the currency had a major role in adjustment the exchange rate and controlling inflation levels, due to the market’s dependence
... Show MoreData security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm
... Show More