The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration. chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology ha
... Show MoreIn this paper, a discretization of a three-dimensional fractional-order prey-predator model has been investigated with Holling type III functional response. All its fixed points are determined; also, their local stability is investigated. We extend the discretized system to an optimal control problem to get the optimal harvesting amount. For this, the discrete-time Pontryagin’s maximum principle is used. Finally, numerical simulation results are given to confirm the theoretical outputs as well as to solve the optimality problem.
Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.
The tourism industry has undergone exponential transformation, reshaped by online travel agencies (OTAs), shifting consumer preferences, and technological advancements. Established OTAs like TripAdvisor and Travelocity face pressures to adapt their strategies to capitalize on these disruptive landscape changes. This research involves a comparative analysis examining the key challenges confronting TripAdvisor and Travelocity, with a focus on opportunities to leverage artificial intelligence (AI) in enhancing personalization and the traveler experience. The study utilizes publicly available data on the companies and academic literature on AI innovation diffusion. Findings reveal that while TripAdvisor has actively developed AI-based trip plan
... Show MoreThe importance of this research lies in shedding light on the concept of techno-strategy for information management from vital and important topics that showed response for change in all areas of life. As this necessitates the updating and changing of it in order to achieve its strategic goals and enhance its technological advantage. The research problem looked at the role of the information technology system (ITS) in enhancing risk management in general directorates for sports and school activity from the viewpoint of its department heads. The research aimed at the relationship of information techno-strategy in risk management and the ratios of the contribution of information techno-strategy in risk management from the viewpoint of heads o
... Show MoreThis study Studied Ministry of Hamdy Al-Buchachy(the first)and explain the features of
this Ministry in a critical time in the history of Iraq. The second world war had began and its
end had reached .The political situation in Iraq is so complicated. The Ministry had made
many things. The Ministry had situated in internal and external complicated time. The
situation in Iraq was so difficult, therefore the recommendor (Abdul-Ilah)asked Hamdy Al-
Bachachy to make be the head of the new governments Al-Bachachy had made irrelevant
government, thus it didn’t last more than three months and the British governorate and of
direct in terference in Iraq who worked to reduce the Iraqi army and the Minister of Defence
refus
In this paper, a polymer-based composite material was prepared by hand Lay-up method consisting of epoxy resin as a base material reinforced by magnesium oxide powder once and silicon dioxide powder again and with different weight ratios (3, 6, 9 and 12) wt %. The three-point bending test was performed in normal conditions and after immersion in sulfuric acid. The results showed that the bending value decreased with the increase of the weighted ratio of the reinforcement material (MgO, SiO2). The Bending of samples reinforced by SiO2 was found to be less than the bending of samples reinforced by particles (MgO). For example, the bending of the SiO2 sample (0.32 mm) at the weighted ratio (3%) and for the MgO (0.18mm) sample at the weight
... Show MoreNew two experiments of the three factors, in this study were constructed to investigate the effects, of the fixed variations to the box plot on subjects' judgments of the box lengths. These two experiments were constructed as an extension to the group B experiments, the ratio experiments the experiments with two variables carried out previously by Hussin, M.M. (1989, 2006, 2007). The first experiment box notch experiment, and the second experiment outlier values experiment. Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box lengths and
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show More