The problem of Multicollinearity is one of the most common problems, which deal to a large extent with the internal correlation between explanatory variables. This problem is especially Appear in economics and applied research, The problem of Multicollinearity has a negative effect on the regression model, such as oversized variance degree and estimation of parameters that are unstable when we use the Least Square Method ( OLS), Therefore, other methods were used to estimate the parameters of the negative binomial model, including the estimated Ridge Regression Method and the Liu type estimator, The negative binomial regression model is a nonline
... Show MoreThis study aims at evaluating the performance of MA students in the College of Education for Women in using the digital transformation and identifying the significant difference in performance evaluation according to the variable of academic qualification (Master or PHD). In order to achieve the aim of the research the researcher prepared a questionnaire of 20 items, and this happens after the researcher's getting acquaintance of the literature of previous studies related to the variable of the research. The apparent validity of the items was examined by exposing them to 10 juries specialized in education, psychology and evaluation and measurement. The stability of the items was examined via two methods, the test-repetition and half-divisio
... Show MoreOvako Working Postures Analyzing System (OWAS) is a widely used method for studying awkward working postures in workplaces. This study with OWAS, analyzed working postures for manual material handling of laminations at stacking workstation for water pump assembly line in Electrical Industrial Company (EICO) / Baghdad. A computer program, WinOWAS, was used for the study. In real life workstation was found that more than 26% of the working postures observed were classified as either AC2 (slightly harmful), AC3 (distinctly harmful). Postures that needed to be corrected soon (AC3) and corresponding tasks, were identified. The most stressful tasks observed were grasping, handling, and positioning of the laminations from workers. The construct
... Show MoreIn this paper the modified trapezoidal rule is presented for solving Volterra linear Integral Equations (V.I.E) of the second kind and we noticed that this procedure is effective in solving the equations. Two examples are given with their comparison tables to answer the validity of the procedure.
Concentrations of uranium were measured in this study for twenty soil samples from four areas with different depths (soil surface-20-40-60-80)cm .The study regions include Missan Governorate (Al-Iskan area,Al-Shibbana area ,Hai-Al Moualimin Al Jadied area ,Sector 30 area). The Uranium concentrations in soil samples measured by using fission tracks registration in (CR-39) track detector that caused by the bombardment of (U-283) with thermal neutrons from (241Am-Be) neutron source that has flux neutron thermal of (5 ×103 n cm-2 s-1). The concentrations values were calculated by a comparison with standard samples. Through out the result, it was found that averages of uranium concentrations in soil samples were as the following : Al - Iskan
... Show MoreThis presented study is to make comparison of cross sections to produce 71As, 72As, 73As and 74As via different reactions with particle incident energy up to 60 MeV of alpha 100 MeV of proton as a part of systematic studies on particle-induced activations on enriched Ge, Ga, Rb and Nb targets and neutron capture. Theoretical calculation of production yield, and suggestion of optimum reaction to produce 71As, 72As, 73As and 74As, based on the main published and approved experimental results of excitation functions were calculated.
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreNineteenth century Gothic literature was deeply concerned with the threats against masculinity. Perhaps one of the most important changes that happened at that time was the emergence of the New Woman model which posed a great threat against masculinity and the male role in the Victorian society. Bram Stoker’s Dracula (1897) portrays female characters who embody this transition in female roles from the domestic wife to the New Woman. This paper focuses on the female characters Mina Murray and Lucy Westenra, their roles in their society, and the different fates they face at the end of the novel, with special focus on Mina’s transformation to the model of the New Woman.