In this paper a measure of linear local dependence has been used between two
random variables and a study is conducted for the properties of this measure where
two examples of bivariate probability distributions has been considered, which are
bivariate Gumbel distribution and bivariate Beta-Stacy distribution, and applied on
data collected by using a questionnaire conducted to study the reasons for the
increase of application in private collages in Iraq. Five elements has been considered
as random variables and the dependence has been measured between every two
elements to estimate how correlated these elements are and their effect on the
application in private collages of Iraq generally and Baghdad specifically.
The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreDifferent cooking conditions were examined for aluminum content in food cooked while wrapped with aluminum foil. The influence of each anticipated factor (the acidity of the cooking medium, type of acids normally used in cuisines namely acetic and tartaric acids, various cooking temperatures, influence of the presence of sodium chloride salt, the effect of cooking oil, and the length of time of cooking) was studied thoroughly as a function of aluminum degraded out of the aluminum foils to the medium. The experimental samples were digested with nitric acid upon fulfillment of examining each factor separately before quantifying aluminum with the sensitive technique of atomic absorption spectroscopy. The outcomes of the study have shown that t
... Show MoreThe research aimed to identify the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information. Such goal includes a set of sub-goals: Knowing the reasons for media offices' reliance on the information provided by the Cabinet's website; and revealing the benefit derived from relying on the Cabinet's website.
The researcher used the survey method to screen and comprehend the extent to which the media offices in the ministries depend on the website of the Iraqi Council of Ministers as a source of information.
The mechanism of comprehensive account of the limits of research wa
... Show MoreThe research aims to define the images of financial aid that it provides within their tasks (central banks to governments) and how it can affect the indicators of banking stability, as well as monitoring the levels of banking stability in the Iraqi economy through the indicators used by the Central Bank of Iraq, and the importance of research in banking stability lies in Iraq, because any decrease in the movement of the aggregate banking stability index will reflect negatively on the financial sector in Iraq. Therefore, the Central Bank sought to provide financial aid to the government through a group of components, some of which are represented by initiatives that contribute to revitalizing the national economy and the other hel
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe transportation model is a well-recognized and applied algorithm in the distribution of products of logistics operations in enterprises. Multiple forms of solution are algorithmic and technological, which are applied to determine the optimal allocation of one type of product. In this research, the general formulation of the transport model by means of linear programming, where the optimal solution is integrated for different types of related products, and through a digital, dynamic, easy illustration Develops understanding of the Computer in Excel QM program. When choosing, the implementation of the form in the organization is provided.
It is no secret that the prophets speech is of great importance, as the second source of Islamic legislation after the Holy Quran, and as such we must reserve and verify the authenticity of the novel and the narrators seizure, and all the conditions laid down by the scholars.
The subject of our research here concerns part of this verification, which is the unknown, the subject of the unknown hadith is considered a matter of great interest by the modernists because it relates to the validity of the novel and the narrators, and the methods of the modernists varied in terms of the reasons for this weakness, the fool never entertained them by the reckless narrative.
I chose the subject of my research the types of Mahjail and
... Show MoreIraqi economy has grown rapidly. Iraqi citizen, therefore, should be very much involved with the comprehensive development after his long patience. Such development should begin with him and his family to get the housing commodity, which is indeed not a cheap one.
In this regard, the Iraqi legislator drew attention to the necessity of issuing housing finan
... Show MoreThe file upload is one of the controls of the tool bar of the VisualStodio.NET, but it can’t be used with Ajax technology (It's almost impossible today to be involved in web application design or development and not be aware of Ajax) because the file upload control don’t support Ajax technology that the execution of the instruction is not completed or the (object is not set) message will appear, although the essential need to use this control with Ajax to gain the asynchronous data transfer that supplied by Ajax, because the file upload don’t work without the Postback operation from the client to the server, and the main idea of Ajax technology is working without Postback operation to the server. After the deep resea
... Show MoreThe study aims to build a model that enhances trust-building for public and private banks to compare and determine the significant differences between public and private banks, by testing the impact of governance mechanisms (transparency, accountability, justice, independence, and social responsibility) (Agere, 2000) on trust-building strategies (trust and trust building, people management, work relations, training and development, leadership practices, and communications) (Ngalo, 2011; Stone et al., 2005), to indicate the level of employees’ awareness of the theoretical contents of the two variables and their importance to banking work, with the aim of improving performance. The main question is the role of governance mechanisms
... Show More