The aesthetic contents of data visualization is one of the contemporary areas through which data scientists and designers have been able to link data to humans, and even after reaching successful attempts to model data visualization, it wasn't clear how that reveals how it contributed to choosing the aesthetic content as an input to humanize these models, so the goal of the current research is to use The analytical descriptive approach aims to identify the aesthetic contents in data visualization, which the researchers interpreted through pragmatic philosophy and Kantian philosophy, and analyze a sample of data visualization models to reveal the aesthetic entrances in them to explain how to humanize them. The two researchers reached several results, namely the application of ornamentation and geometric abstraction through the entrance of mathematical abstraction based on individual perception in Kant's philosophy of sublimeness. Community icons and inherited traditions were also utilized through the entrance of life events based on collective experience in pragmatic philosophy. Both approaches lead to Aesthetic excitement and a sense of pleasure due to its access to human realities.
Azithromycin is the drug of choice in the treatment of several bacterial infections, most often those causing middle ear infection, bronchitis, pneumonia, typhoid and sinusitis. It’s also effective against certain urinary tract infections and venereal diseases. This study was carried out to prepare an acceptable suspension either as dry physical mixture powder or granules to be reconstituted, through studying the effect of various type and concentration of suspending agent (xanthan gum, hydroxypropyl methylcellulose (HPMC), either alone or in combination) on the release profile of the drug. The best prepared suspension formulas (H& III) were selected depending on the dissolution profile of each formulas and then compared with
... Show MoreFelodipine is a calcium-channel blocker with low aqueous solubility and bioavailability. Lipid dosage forms are attractive delivery systems for such hydrophobic drug molecules. Nanoemulsion (NE) is one of the popular methods that has been used to solve the dispersibility problems of many drugs. Felodipine was formulated as a NE utilizing oleic acid as an oil phase, tween 80 and tween 60 as surfactants and ethanol as a co-surfactant. Eight formulas were prepared, and different tests were performed to ensure the stability of the NEs, such as particle size, polydispersity index, zeta potential, dilution test, drug content, viscosity and in-vitro drug release. Result
... Show More
Abstract:
We can notice cluster data in social, health and behavioral sciences, so this type of data have a link between its observations and we can express these clusters through the relationship between measurements on units within the same group.
In this research, I estimate the reliability function of cluster function by using the seemingly unrelate
... Show MoreThis paper provides an attempt for modeling rate of penetration (ROP) for an Iraqi oil field with aid of mud logging data. Data of Umm Radhuma formation was selected for this modeling. These data include weight on bit, rotary speed, flow rate and mud density. A statistical approach was applied on these data for improving rate of penetration modeling. As result, an empirical linear ROP model has been developed with good fitness when compared with actual data. Also, a nonlinear regression analysis of different forms was attempted, and the results showed that the power model has good predicting capability with respect to other forms.
<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreThis study examines the analysis of the contents of the international public relations campaign in confronting the Covid-19 virus, which was taken from the (Your Health is a Trust) campaign for the World Health Organization, Iraq office.The research problem revolves around a main question that is, what are the axes of the campaign (Your Health is a Trust) established by the World Health Organization (Iraq office) in the prevention of Covid 19 virus?From this main question, several sub-questions emerged that this study answered on their Facebook page, and the communication activities of the Covid-19 awareness campaign. In the content analysis form, as this form included a number of main themes and main categoriesthat were adopted in analyzin
... Show MoreThis research tackles the subject of the aesthetic experience. It shows the most prominent views of critics, discusses their opinions, and compares them
Twitter data analysis is an emerging field of research that utilizes data collected from Twitter to address many issues such as disaster response, sentiment analysis, and demographic studies. The success of data analysis relies on collecting accurate and representative data of the studied group or phenomena to get the best results. Various twitter analysis applications rely on collecting the locations of the users sending the tweets, but this information is not always available. There are several attempts at estimating location based aspects of a tweet. However, there is a lack of attempts on investigating the data collection methods that are focused on location. In this paper, we investigate the two methods for obtaining location-based dat
... Show More