The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial
... Show MoreIn light of the development in computer science and modern technologies, the impersonation crime rate has increased. Consequently, face recognition technology and biometric systems have been employed for security purposes in a variety of applications including human-computer interaction, surveillance systems, etc. Building an advanced sophisticated model to tackle impersonation-related crimes is essential. This study proposes classification Machine Learning (ML) and Deep Learning (DL) models, utilizing Viola-Jones, Linear Discriminant Analysis (LDA), Mutual Information (MI), and Analysis of Variance (ANOVA) techniques. The two proposed facial classification systems are J48 with LDA feature extraction method as input, and a one-dimen
... Show MoreCarbon Nanopowder was fabricated by arc discharge technique at deposition pressure of 10-5 mbar Argon gas on glass substrates. The prepared carbon nano- powder was collected from chamber and purified with nitric acid at 323K .The morphology and crystalline structure of the prepared powder was examined by X-Ray Diffraction (XRD), Atomic Force Microscope (AFM), and Scanning Electron Microscope (SEM). XRD spectrums showed that the powder exhibits amorphous structure and after purification, the powder showed hexagonal structure with a preferential orientation along(002) direction ,where AFM and SEM gave very compatible estimation on the grain size and shape of the nanopowder.
Extemporization is the ability of the actor to reflect his internal being. It gives a sort of confidence and an ability to show the personal countenance of the role away from tension and rigidity. By extemporization, it is possible to deal with and criticize the real living life so it is an intellectual, emotional, sensual, and perceptive process connected with the psychological energy and the emotional memory and all this goes under the control of the director and his instigations and instructions depending on what the text involves of intellectual, social and psychological motivators so it primarily depends on talent, chance and discussion. The research involves four chapters; the first contains the problem
... Show MoreResearch aims to shed light on the concept of corporate failures , display and analysis the most distinctive models used to predicting corporate failure; with suggesting a model to reveal the probabilities of corporate failures which including internal and external financial and non-financial indicators, A tested is made for the research objectivity and its indicators weight and by a number of academics professionals experts, in addition to financial analysts and have concluded a set of conclusions , the most distinctive of them that failure is not considered a sudden phenomena for the company and its stakeholders , it is an Event passes through numerous stages; each have their symptoms that lead eve
... Show MoreThe research aims to presenting a number of scenarios for the investment of the marshes. The problem of research problem was that there is no in-depth analysis of the marshes environment. The traditional methods of the environmental analysis are insufficient. The research community is represented by the decision makers in Maysan Governorate. The research led to proposing of three scenarios with statement the requirements for the success of each one. The most important conclusions are that the three proposed scenarios for marshes investment depend on the availability of the required volunteers for each scenario. The higher the availability of the requirements, the more optimistic the scenario becomes. If t
... Show MoreThe interest in pre-service teacher training has become influential in teaching English as a foreign language, and the purpose of this training course is to prepare qualified teachers to teach effectively through the application of this technique by undergraduate students. This research aims to find out the effect of using the seven principles of good practice as a teaching technique on the fourth stage student-teachers’ performance at the College of Education for Women/University of Baghdad, during the academic year 2017-2018. The sample includes (60) students selected according to the stratified sampling method. The observational checklist used by the department to assess the student teachers’ performance during the practicum perio
... Show MoreThis paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.