. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction accuracy criterion and matching curve-fitting in this work demonstrated that if the residuals of the revised model are white noise, the forecasts are unbiased. Future work investigating robust hybrid model forecasting using fuzzy neural networks would be very interesting
Asthma is a condition characterized by bronchial spasms, inflammation, and mucous hypersecretion which leads to difficulties in respiration. Asthmatic patients are usually presented with recurrent attacks of coughing, wheezing, and shortness of breath which could be life-threatening. More than three million cases of asthma in the United States are diagnosed annually. Resveratrol, a polyphenolic stilbene, is known to be useful in controlling asthmatic attacks via different molecular mechanisms within the lung epithelium and infiltrating immune cells. However, few studies mentioned the effect of resveratrol on the microbiome in ovalbumin-induced asthma mouse model. In this study, we ind
In this paper, an analytical solution describing the deflection of a cracked beam repaired with piezoelectric patch is introduced. The solution is derived using perturbation method. A novel analytical model to calculate the proper dimensions of piezoelectric patches used to repair cracked beams is also introduced. This model shows that the thickness of the piezoelectric patch depends mainly on the thickness of the cracked beam, the electro-mechanical properties of the patch material, the applied load and the crack location. Furthermore, the model shows that the length of the piezoelectric patches depends on the thickness of the patch as well as it depends on the length of the cracked beam and the crack depth. The additio
... Show More
Prepositions have a key function, which is to associate parts of a sentence, called letters In addition, it adds the meanings of the verbs to the names, ie reached by them, and called by the coffin characters Qualities..
I chose to search for the meaning of the preposition "from" in Surat Maryam to know its meanings in terms of originality and expansion, so the title of the research (the meanings of preposition "from" in terms of originality and expansion in Surat Maryam model(
الخلاصة
تشير نظريات علم اجتماع المعرفة الى ان ظهور مفهوم معين او سقوطه لايتم بمحض الصدفة، بل نتيجة تفاعل مجموعة من العوامل الثقافية والسياسية وحتى الاقتصادية ومن هنا فأن ظهور مفهوم الاثنية كان محصلة عوامل كثيرة خصوصاً بعد ان اصبح موضوع الاثنية في العقود الاخيرة من القرن الماضي وبداية القرن الواحد والعشرين محور نقاش رئيس في ميدان البحث الاجتماعي والسياسي، ليس في
... Show MoreWhen exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u
... Show MoreThe absence of ecological perception in the local urbanization resulted in the lack of a clear conception of achieving sustainability in its simplest form in the urban reality and in the city of Baghdad in particular. The research assumes the possibility of achieving urban sustainability in Iraqi cities by applying the cities for the most effective methods to implemented ecological solutions and introducing appropriate urban planning tools and improve the living environment. The research focuses on the ability to define some aspects to achieve a sustainable local urban identity from global experiences. This was performed by proposing a scheduled theoretical framework, through which th
Abstract
This study talks about a wonderful Qur'anic style. relates to one of the methods used in it. And it's the rhetorical style: ''Affirmative say''. It is useful in arguing with the opponent, nullifying his reasoning, and proving the opposite meaning of the opponent. The study will be conducted from a Qur'anic perspective based on the study of examples of it, and partly in interpretive treatment through the book of editing and enlightenment of Taher Ibn Ashour, known for his art in matters of rhetoric and methods of controversy. This is with the rooting of this issue, and the relationship of industrial sciences to it as a Qur'anic style.
Keywords: ''Affirmative say, style, Qur'anic rhetoric, Arabic rhetoric, Co
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show More