This research aims to suggest formulas to estimate carry-over effects with two-period change-over design, and then, all other effects in the analysis of variance of this design, and find the efficiency of the two-period change-over design relative to another design (say, completely randomized design).
Colon cancer is an abnormal growth of cells that occurs in the large intestine. Sometimes growth remains restricted for a relatively long time before it becomes a malignant tumor and then spreads through the intestinal wall to the lymph nodes and other parts of the body. The study aims to estimate the effectiveness and partial purification of lipoxygenase (LOX) enzyme and measure gamma-glutamyle transferase (GGT) activity in serum patients of colon cancer in Baghdad. The study included (80) case male patients with colon cancer with (50) samples of apparently healthy males (control) as comparison group. The result displayed a noteworthy increase in lipoxygenase effectivene
... Show MoreMultilevel models are among the most important models widely used in the application and analysis of data that are characterized by the fact that observations take a hierarchical form, In our research we examined the multilevel logistic regression model (intercept random and slope random model) , here the importance of the research highlights that the usual regression models calculate the total variance of the model and its inability to read variance and variations between levels ,however in the case of multi-level regression models, the calculation of the total variance is inaccurate and therefore these models calculate the variations for each level of the model, Where the research aims to estimate the parameters of this m
... Show MoreCloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v
... Show MoreTwo simple and sensitive spectrophotometric methods are proposed for the determination of amitriptyline in its pure form and in tablets. The first method is based on the formation of charge- transfer complex between amitriptyline as n-donor and tetracyano-ethylene (TCNE) as πacceptor. The product exhibit absorbance maximum at 470 nm in acetonitrile solvent (pH =9.0 ) . In the second method the absorbance of the ion- pair complex, which is formed between the soughted drug and bromocresol green (BCG), was measured at 415 nm at ( pH=3.5) . In addition to classical univariate optimization, modified simplex method (MSM) was applied in the optimization of the variable affecting the color producing reaction by a geometric simple
... Show MoreFinding a path solution in a dynamic environment represents a challenge for the robotics researchers, furthermore, it is the main issue for autonomous robots and manipulators since nowadays the world is looking forward to this challenge. The collision free path for robot in an environment with moving obstacles such as different objects, humans, animals or other robots is considered as an actual problem that needs to be solved. In addition, the local minima and sharp edges are the most common problems in all path planning algorithms. The main objective of this work is to overcome these problems by demonstrating the robot path planning and obstacle avoidance using D star (D*) algorithm based on Particle Swarm Optimization (PSO)
... Show MoreWheat (Triticum aestivum L.) is one of the Poaceae family (Gramineae). Is momentous for human nutrition, and the stresses can affect strongly on the phenotype characteristics of the plant. The aim of this study was to determine how electric shock on germinated grain (for 2.5, 5, and 7.5 mins.) and heat shock at ( 35 oC, 40 oC and 45 oC) applied after phase out the radical length of 2-5 mm, from the grain of two wheat Varieties: “Baghdad 1” and “Babylon 113”. The electric shock for 2.5 mins., lead to delay of flowering, from day to 50 % flowering was 93 day, as well as, gave lowest value of plant height 64.5cm and lowest spike length was 10.7 cm. While The highest flag leaf area was obtained by electric shock for 5 mins. was 56.6
... Show MoreIn this paper, suggested method as well as the conventional methods (probability
plot-(p.p.) for estimations of the two-parameters (shape and scale) of the Weibull
distribution had proposed and the estimators had been implemented for different
sample sizes small, medium, and large of size 20, 50, and 100 respectively by
simulation technique. The comparisons were carried out between different methods
and sample sizes. It was observed from the results that suggested method which
were performed for the first time (as far as we know), by using MSE indicator, the
comparisons between the studied and suggested methods can be summarized
through extremely asymptotic for indicator (MSE) results by generating random
error
Most available methods for unit hydrographs (SUH) derivation involve manual, subjective fitting of
a hydrograph through a few data points. The use of probability distributions for the derivation of synthetic
hydrographs had received much attention because of its similarity with unit hydrograph properties. In this
paper, the use of two flexible probability distributions is presented. For each distribution the unknown
parameters were derived in terms of the time to peak(tp), and the peak discharge(Qp). A simple Matlab
program is prepared for calculating these parameters and their validity was checked using comparison
with field data. Application to field data shows that the gamma and lognormal distributions had fit well.<
In light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show More