Statistical methods of forecasting have applied with the intention of constructing a model to predict the number of the old aged people in retirement homes in Iraq. They were based on the monthly data of old aged people in Baghdad and the governorates except for the Kurdistan region from 2016 to 2019. Using Box-Jenkins methodology, the stationarity of the series was examined. The appropriate model order was determined, the parameters were estimated, the significance was tested, adequacy of the model was checked, and then the best model of prediction was used. The best model for forecasting according to criteria of (Normalized BIC, MAPE, RMSE) is ARIMA (0, 1, 2).
Statistical methods of forecasting have applied with the intention of constructing a model to predict the number of the old aged people in retirement homes in Iraq. They were based on the monthly data of old aged people in Baghdad and the governorates except for the Kurdistan region from 2016 to 2019. Using BoxJenkins methodology, the stationarity of the series was examined. The appropriate model order was determined, the parameters were estimated, the significance was tested, adequacy of the model was checked, and then the best model of prediction was used. The best model for forecasting according to criteria of (Normalized BIC, MAPE, RMSE) is ARIMA (0, 1, 2)
Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio
... Show MoreObjective: To measure the effect of the pharmacist-led medication reconciliation service before hospital discharge on preventing potential medication errors. Methods: This behavioral interventional study took place in a public teaching hospital in Iraq between December 2022 and January 2023. It included inpatients who were taking four or more medications upon discharge from the internal medicine ward and the cardiac care unit. The researcher provided the patients with a medication reconciliation form and reconciliation form (including medication regimen and pharmacist instructions) before discharging them home. Any discrepancies between the patients’ understanding and the actual medication recommendations prescribed by the physici
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreThe study was aimed to evaluate the marketing efficiency of dry Onion crop in Salah al-Deen, as estimate the impact of some quality and quantity factors in the efficiency of marketing process of crop using Tobit regression model. The average marketing efficiency of the research sample was 71.3686%. The marketing margins differed according to the marketing channel followed in marketing the crop. The qualitative and quantitative variables in the model are productivity, family size, distance from the market, educational level. The estimated model revealed that a variable productivity is the most important and influential in marketing efficiency, followed by the variable of the distance between the farm and the market, then the variable
... Show MoreThe study was aimed to evaluate the marketing efficiency of dry Onion crop in Salah al-Deen, as estimate the impact of some quality and quantity factors in the efficiency of marketing process of crop using Tobit regression model. The average marketing efficiency of the research sample was 71.3686%. The marketing margins differed according to the marketing channel followed in marketing the crop. The qualitative and quantitative variables in the model are productivity, family size, distance from the market, educational level. The estimated model revealed that a variable productivity is the most important and influential in marketing efficiency, followed by the variable of the distance between the farm and the market, then the variable
... Show MoreWith the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev
... Show MoreOver the past few years, ear biometrics has attracted a lot of attention. It is a trusted biometric for the identification and recognition of humans due to its consistent shape and rich texture variation. The ear presents an attractive solution since it is visible, ear images are easily captured, and the ear structure remains relatively stable over time. In this paper, a comprehensive review of prior research was conducted to establish the efficacy of utilizing ear features for individual identification through the employment of both manually-crafted features and deep-learning approaches. The objective of this model is to present the accuracy rate of person identification systems based on either manually-crafted features such as D
... Show More