In this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.
The use of antibiotics without prescription (self-medication) is growing globally and is associated with increased bacterial resistance, ineffective treatment and adverse reactions. This study aimed at assessing the practice of antibiotic self-medication in the Iraqi population. A cross-sectional study design was adopted in this work. The sample was comprised of 303 staff members from the non-medical colleges in Iraq. An online questionnaire was distributed between the 29th of June to the 14th of September 2021 to collect data including socio-demographic characteristics and questions about antibiotic self-medication. Most of the participants had a university degree and a moderate monthly income. The majority (88%) h
... Show MoreBackground: In the present study used device jet plasma needle with atmospheric pressure which generates non thermal plasma jet to measure treatment potent with plasma against pathogenic bacteria founded in UTI was inactivated with plasma at 10 sec,
Objective:. This work included the application of the plasma produced from the system in the field of bacterial sterilization , where sample of Gram- negative bacteria (Escherichia coli) were exposed to intervals (1-10)second . Midstream Urine samples swabs were obtained from patients with urinary tract infections.
Type of the study: Cross -sectional study.
Methods: The work were used i
... Show MoreMental systems in ontological discourse turned into deliberative systems, derived from the non-coordinated thought that motivated ontological discourse, as an incomplete thought, after it became close to reason; Between creation and prevention, between reasoning and creation, between submission and ambition, the result of an interconnected entity that slays one another from one another, and intersects with one another, to produce a special pattern each time, completely different from its predecessor or to provide a path for the coordination of others, which is outside the linguistic event, or part From it, signs and marks, produced to a large extent M., and united the signs; to return again in a circular and rotational movement to produc
... Show MoreQuantum key distribution (QKD) provides unconditional security in theory. However, practical QKD systems face challenges in maximizing the secure key rate and extending transmission distances. In this paper, we introduce a comparative study of the BB84 protocol using coincidence detection with two different quantum channels: a free space and underwater quantum channels. A simulated seawater was used as an example for underwater quantum channel. Different single photon detection modules were used on Bob’s side to capture the coincidence counts. Results showed that increasing the mean photon number generally leads to a higher rate of coincidence detection and therefore higher possibility of increasing the secure key rate. The secure key rat
... Show MoreWireless sensor networks (WSNs) are emerging in various application like military, area monitoring, health monitoring, industry monitoring and many more. The challenges of the successful WSN application are the energy consumption problem. since the small, portable batteries integrated into the sensor chips cannot be re-charged easily from an economical point of view. This work focusses on prolonging the network lifetime of WSNs by reducing and balancing energy consumption during routing process from hop number point of view. In this paper, performance simulation was done between two types of protocols LEACH that uses single hop path and MODLEACH that uses multi hop path by using Intel Care i3 CPU (2.13GHz) laptop with MATLAB (R2014a). Th
... Show More