The current research aims to first - reveal the social repercussions of COVID-19 on women A - The impact of the epidemiological crisis on the social structure of the family B - Psychological and social pressures that women are exposed to during the Covid pandemic C - Social isolation resulting from the injury of a member Second - Understanding the health consequences of COVID-19 on women A- Mechanisms of differentiation in the treatment of Covid-19 treatment, home or hospital As for the limits of the research, the current research is determined by some private universities of students, female employees and teaching staff in Karkh district, which number eight (Al-Hikma, Al-Farahidi, Al-Farabi, Tigris, AlTurath, Al-Rashid, Al-Mashreq, Al-Nusour) for the academic year 2020-2021 AD. The current research relied on the descriptive analytical approach, The research community was limited to all women affiliated with private universities located in the city of Baghdad, including female students, teachers and employees on the Karkh side only, who were withdrawn from (8) private universities, and their number is (20526) women, with a rate of (19298) female students, and (579) An employee, and (649) female teachers for the year (20202021), the researchers built a questionnaire for the health and social repercussions of the epidemiological crisis (Covid-19) on women. The researchers are conducting research aimed at studying the mutant covid-19 micron, especially in the current stage, and conducting extensive research on vulnerable groups and covid-19 mutant in the current stage
Wireless sensor applications are susceptible to energy constraints. Most of the energy is consumed in communication between wireless nodes. Clustering and data aggregation are the two widely used strategies for reducing energy usage and increasing the lifetime of wireless sensor networks. In target tracking applications, large amount of redundant data is produced regularly. Hence, deployment of effective data aggregation schemes is vital to eliminate data redundancy. This work aims to conduct a comparative study of various research approaches that employ clustering techniques for efficiently aggregating data in target tracking applications as selection of an appropriate clustering algorithm may reflect positive results in the data aggregati
... Show MoreThe aim of the current research is to know the degree to which middle school teachers and female teachers in the southern border schools use electronic educational alternatives in the field of education from their point of view and its relationship to some variables, and to achieve this goal, a random sample of (200) teachers was selected in southern border schools, and a questionnaire was prepared to collect The data, as well as the descriptive approach was used to achieve this goal. T-test and analysis of variance were used for the statistical treatment. The results concluded that the educational courses provided to male and female teachers are not sufficient. It has also been concluded that the use of electronic educational alternativ
... Show MoreQuality is one of the important criteria to determine the success of product. So quality control is required for all stages of production to ensure a good final product with lowest possible losses. Control charts are the most important means used to monitor the quality and its accuracy is measured by quickly detecting unusual changes in the quality to maintain the product and reduce the costs and losses that may result from the defective items. There are different types of quality control charts and new types appeases involving the concept of fuzziness named multinomial fuzzy quality control chart (FM) , dividing the product to accepted and not may not be accurate therefore adding fuzziness concept to quality charts confirm and a
... Show MoreAbstract
The decision maker needs to understand the strategic environment to be addressed through different means and methods. It is obvious that there is a difference between the three strategic environments (conflict environment, peace environment, post- peace environment) in terms of inputs and strategies to deal with each one of them. There is an urgent need to understand each pattern separately, analyze its inputs, and identify the factors and variables that affect the continuity of this situation (conflict, peace, post-peace). It is not appropriate to identify treatment without diagnosis of the condition, so it is very important to understand the type of strategic environment to be dealt with it.
... Show MoreIn this work, a comparative analysis for the behavior and pattern of the variations of the IF2 and T Ionospheric indices was conducted for the minimum and maximum years of solar cycles 23 and 24. Also, the correlative relationship between the two ionospheric indices was examined for the seasonal periods spanning from August 1996 to November 2008 for solar cycle 23 and from December 2008 to November 2019 for solar cycle 24. Statistical calculations were performed to compare predicted values with observed values for the selected indices during the tested timeframes. The study's findings revealed that the behavior of the examined indices exhibited almost similar variations throughout the studied timeframe. The seasonal variations were
... Show MoreLinear regression is one of the most important statistical tools through which it is possible to know the relationship between the response variable and one variable (or more) of the independent variable(s), which is often used in various fields of science. Heteroscedastic is one of the linear regression problems, the effect of which leads to inaccurate conclusions. The problem of heteroscedastic may be accompanied by the presence of extreme outliers in the independent variables (High leverage points) (HLPs), the presence of (HLPs) in the data set result unrealistic estimates and misleading inferences. In this paper, we review some of the robust
... Show MoreWith the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade t
... Show More