Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete hazard function and the time-dependent parameters, two estimation methods have been used that depend on the Bayes method according to dynamic modeling: the Maximum A Posterior method (MAP) This method was done using numerical methods represented by a Iteratively Weighted Kalman Filter Smoothing (IWKFS) and in combination with the Expectation maximization algorithm (EM), the other method is represented by the Hybrid Markov Chains Monte Carlo (HMCMC) method using the Metropolis Hasting algorithm (MH) and Gypsum sampling (GS). It was concluded that survival analysis by descretization the data into a set of intervals is more flexible and fluid, as this allows analyzing risks and diagnosing impacts that vary over time. The study was applied in the survival analysis on dialysis until either death occurred due to kidney failure or the competing event, represented by kidney transplantation. The most important variables affecting the patient’s cessation of dialysis were also identified for both events in this research.
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreThe process of evaluating and measuring tax performance is critical to support the tax collection process. The comparison of the amount of revenue collection with what is expected and the process of measuring tax performance continuously by the tax administration leads to increase the collection of tax, determine the size of deviations and stand and know the reasons and take the necessary measures to address them to get a better result in the future. According to the different tasks assigned to them, criteria and indicators for measuring the tax performance vary from one organization to another. These are indicators or criteria that measure tax revenue (i.e., amounts). One of the research's main findings was to raise the tax collection leve
... Show MoreThe problem of this study lies in that NATO was formed in the first place to protect Europe from Warsaw Pact. The geographical and military strategy have been changed with the change of its mission and expanding its operation scope with the leadership of the USA in the international scens. The latter has made this organization as the military arm to tighten its control over strategic regions.
The research supposes that NATO state members confront security concerns and political and military issues that push to expand the organization. The importance of this study lies in knowing the new roles of NATO imposed by the United States. Therefore, the continuity and affi
... Show MoreAb – initio restricted Hartree - Fock method within the framework of large unit cell (LUC) formalism is used to investigate the electronic structure of Si and Ge nanocrystals. The surface and core properties are investigated. A large unit cell of 8 atoms is used in the present analysis. Cohesive energy, energy gap, conduction and valence band widths are obtained from the electronic structure calculations. The results are compared with available experimental data and theoretical results of other investigators. The calculated lattice constant is found to be slightly larger than the corresponding experimental value because we use only 8 atoms and we compared the results with that of the bulk crystals, nanoclusters are expected to have str
... Show MoreThe aim of the research is to find out the effect of applying classroom assessment techniques (CATs) on both mathematical and logical thinking among fourth-grade scientific students. In pursuit of the research objectives, the experimental method was used, and the quasi-experimental design was used for two equivalent groups, one control group taught in the traditional way and the other experimental taught according to the techniques of classroom structural evaluation. The research sample consisted of (44) students from the fourth scientific grade who were intentionally chosen after ensuring their equivalence in several factors, most notably chronologi-cal age and the level of mathematics, and they were distributed equally among the t
... Show MoreListening comprehension of Iraqi EFL college students are not given time for practice, and incorporate in the programme of the Department of English, therefore, students are not well-prepared to comprehend the spoken language also the Iraqi EFL College students are deficient in comprehending the spoken English. So, listening strategies require a larger amount of consistent practice. The present study aims at finding out the effect of teaching the proposed listening strategies programme on EFL university students' listening comprehension. The sample consists of 104 of 1st year college students at the Department of English Language, College of Education Ibn-Rushed for Humanities. The programme deals with the following strategies: summrazing-n
... Show MoreFG Mohammed, HM Al-Dabbas, Science International, 2018 - Cited by 2
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.