The objective of the study is to demonstrate the predictive ability is better between the logistic regression model and Linear Discriminant function using the original data first and then the Home vehicles to reduce the dimensions of the variables for data and socio-economic survey of the family to the province of Baghdad in 2012 and included a sample of 615 observation with 13 variable, 12 of them is an explanatory variable and the depended variable is number of workers and the unemployed.
Was conducted to compare the two methods above and it became clear by comparing the logistic regression model best of a Linear Discriminant function written
... Show MoreThe current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances. From the diversity of Big Data variables comes many challenges that can be interesting to the researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter
... Show MoreThree Seismic Attributes are used to enhance or delineate geologic feature that cannot be detected within seismic resolution limit. These are Instantaneous Amplitude, Instantaneous Phase and Instantaneous Frequency Attributes. These are applied along two defined picked surface horizons within 3D seismic data for an area in southern Iraq. Two geologic features are deduced, the first represents complex channel system at the top of Saadi Formation and the second represents submarine fan within Mishrif Formation. The semblances of these ancient geological features are dramatically enhanced by using flattening technique.
The children are suffering from many kinds of tragedy acts such as killing and torture which arise from civil wars never be seen along the human history since decades.
We still see millions of children suffering specially in the Arab world, Iraq, Syria, Libya, and Yemen. This study deals with kinds of protections which comes by international treaties and practiced by international organizations which helps in the protection through the military conflicts, and we compare this right in the Islamic shree, and how the states are comply with this right and how can they protect the children practically.
At last we reach the conclusion and finally the recommendations.
Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThis paper considers the maximum number of weekly cases and deaths caused by the COVID-19 pandemic in Iraq from its outbreak in February 2020 until the first of July 2022. Some probability distributions were fitted to the data. Maximum likelihood estimates were obtained and the goodness of fit tests were performed. Results revealed that the maximum weekly cases were best fitted by the Dagum distribution, which was accepted by three goodness of fit tests. The generalized Pareto distribution best fitted the maximum weekly deaths, which was also accepted by the goodness of fit tests. The statistical analysis was carried out using the Easy-Fit software and Microsoft Excel 2019.
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreThis work was influenced the separation and preconcentration steps were carried out to determination of metformin (MET) in pharmaceutical preparations and human serum samples. Complex formation method and cloud-point extraction (CPE) coupling with UV-Visible spectrophotometry were used to investigated of study target.The results has showed the best optical characteristic for calibration curve and statistical data which were obtained under optimum conditions. The first method is based on the reaction of MET with nickel (II) in alkaline medium an absorption maximum ?)max) at 434nm. ''Beer's low'' is obeyed in the concentration range (10-100µg.ml-1) with molar absorptivity of 3.9x103 L.mol-1.cm-1.The limit of detection and quantitation valu
... Show More