Abstract
The Classical Normal Linear Regression Model Based on Several hypotheses, one of them is Heteroscedasticity as it is known that the wing of least squares method (OLS), under the existence of these two problems make the estimators, lose their desirable properties, in addition the statistical inference becomes unaccepted table. According that we put tow alternative, the first one is (Generalized Least Square) Which is denoted by (GLS), and the second alternative is to (Robust covariance matrix estimation) the estimated parameters method(OLS), and that the way (GLS) method neat and certified, if the capabilities (Efficient) and the statistical inference Thread on the basis of an acceptable
... Show MoreThis research investigates the importance of social accounting and the auditor’s report. It basically checks if there is an impact of social accounting on the auditor’s report at the availability the INTOSAI standards No. (1700 and 1706). The study recruited 105 employees of the Federal Financial Supervision Office in Iraq. Data were collected using questionnaire. The questionnaire validity and reliability were checked to assure the truthfulness of the findings. The study found a positive correlation and a statistically significant effect between the accounting for social responsibility and the auditor’s report. It is necessarily recommended for the auditor and the bodies working in the Board of Supreme Audit to ensure the inclusio
... Show MoreThe problem of this research lies in the fact that there is a lack of accurate scientific perceptions about the size of the use of Iraqi women’s social networking sites and the motives behind this use and the expectations generated by them.
The goals of the research are as follows:
1- Determine the extent of Iraqi women’s use of social networking sites (Facebook, YouTube, twitter, and Instagram).
2- Investigative the motives behind the use of social networking sites by Iraqi women.
3- Detecting the repercussions of Iraqi women’s use of social networking sites (Facebook, you tube, twitter, and Instagram).
The research is classified as a descriptive one. The researchers use the survey methodology. The research commu
Background: The finite element method (FEM) is expected to be one of the most effective computational tools for measuring the stress on implant-supported restorations. This study was designed using the 3D-FEM to evaluate the effect of two adhesive luting types of cement on the occlusal stress and deformation of a hybrid crown cemented to a mono-implant. Materials and Method: The mono-screw STL file was imported into the CAD/CAM system library from a database supported by De-Tech Implant Technology. This was to assist in the accurate reproduction of details and design of a simulated implant abutment. Virtually, a digital crown was designed to be cemented on an abutment screw. A minimum occlusal thickness of 1mm and marginal fitting of 1.2
... Show MorePurpose: As a result of the sudden and ill-considered trade openness of Iraq after 2003 to the countries of the world in general and the neighboring countries in particular, and in the absence of the necessary support for the national productive forces and the lack of effective standardization and quality control devices, this led to the exposure of most local products, especially agricultural ones, to decline and inability On the competition and thus dumping the Iraqi market, especially the agricultural products, with imported products, this study came to find out the effect that dumping has on the local production of chicken meat and the impact of that impact on the size of the food gap, and whether the results of the practica
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More500 samples of diarrhea stool were collected from different ages(less than 1year –upto30years) and for both genders from some patients in (Alwiya hospital for children, Al-kendi, central health public laboratory and some gavernarated labs) period(1/11/2009—1/10/2010). Kinds of bacteria and parasites agents were isolated and identified from patients with diarrhea. Nine species of gram negative bacteria from enterobacteriaceae were isolated, E. coli isolated are the higher ratio 4.8% of all, then Salmonella typhi4.6% while the lowest ratios is Citrobacterfreundii 0.4%, while the other identified species were be among the previous rotios. also Plesomonasshigelloides was isolated which concedride one of the bacterial local studies.many met
... Show MoreIn spite of the foundation of Iraqi state in 1921 and the formation of the new features of
the modern state, however, the inherited costumes and traditions sustained in the conservative
society. But due to the development that inflicted to the Iraqi society and the development of
the staff in all fields and requirement conducting to female learning. After WW II and the
1950s, women get out of their houses to seek learning by approaching the doors.
What is positive about that phase was the formation of the College of Queen A'liya
which is regarded as a positive indicator. In any case the Iraqi family encouraged women to
be indulged in higher education. Calling the college Queen A'liya
The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re
... Show More