In general, the importance of cluster analysis is that one can evaluate elements by clustering multiple homogeneous data; the main objective of this analysis is to collect the elements of a single, homogeneous group into different divisions, depending on many variables. This method of analysis is used to reduce data, generate hypotheses and test them, as well as predict and match models. The research aims to evaluate the fuzzy cluster analysis, which is a special case of cluster analysis, as well as to compare the two methods—classical and fuzzy cluster analysis. The research topic has been allocated to the government and private hospitals. The sampling for this research was comprised of 288 patients being treated in 10 hospitals. As the similarity between hospitals of the study sample was measured according to the standards of quality of health services under fuzzy conditions (a case of uncertainty of the opinions of patients who were in the evaluation of health services provided to them, which was represented by a set of criteria and was measured in the form of a Likert five-point scale). Moreover, those criteria were organized into a questionnaire containing 31 items. The research found a number of conclusions, the most important is that both methods of hierarchical cluster analysis and fuzzy cluster analysis, classify the hospitals of the research sample into two clusters, each cluster comprises a group of hospitals that depend on applying health quality service standards. The second important conclusion is that the fuzzy cluster analysis is more suitable for the classification of the research sample compared to hierarchical cluster analysis.
أن الغرض من هذه الدراسة هو التحليل الهيكلي لبنية مقياس الصحة النفسية لطلبة الجامعة الذي طورته الجنابي (1991) باستخدام التحليل العاملي. إن 66 طالبا و95 طالبة من كلية التربية في الجامعة المستنصرية قد استجابوا لفقرات المقياس. وقد أظهر التحليل العاملي وجود خمسة عوامل فسرت 30% من التباين, وان هذه العوامل هي الإستقرار العائلي، والأمن الاقتصادي، والمسؤولية الإجتماعية، وتقدير الذات، والأمن النفسي.
تحديدات مفاهيمية في التحليل السياسي
In this paper the method of singular value decomposition is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.
The business environment is witnessing great and rapid developments due to the economic and technological development that has caused damage to human beings, which requires the need to reduce this damage and work to protect the environment and participate in supporting the social aspects. This requires economic resources to be realized by the economic units. Economic development in preserving the environment that has caused damage and supporting the social aspects that preserve human rights, enhance their position and satisfy their needs in society. Global professional organizations, the United Nations and stakeholder representatives have been issuing the Global Reporting Initiative (GRI) to find guidelines for the preparation of
... Show MoreThis semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) ca
... Show MoreBlock cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block
... Show MoreBeta Distribution
Abstract
Gamma and Beta Distributions has very important in practice in various areas of statistical and applications reliability and quality control of production. and There are a number of methods to generate data behave on according to these distribution. and These methods bassic primarily on the shape parameters of each distribution and the relationship between these distributions and their relationship with some other probability distributions. &nb
... Show MoreAd-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot
... Show More