In this paper we will explain ,how use Bayesian procedure in analysis multiple linear regression model with missing data in variables X's as the new method suggest , and explain some of missing Patterns under missing mechanism , missing complete at random MCAR and compare Bayesian estimator with complete case estimator by use simulation procedure .
ABSTRACT
The research aims to study the effect of the commodity dumping phenomenon that Iraq suffered after 2003 on the consumption pattern of individuals, towards the acquisition of non-essential goods (luxury). To achieve our goal we relied on the questionnaire as a main tool for obtaining information related to the research, and it was distributed on a random sample of consumers in the city of Baghdad with 250 questionnaires. The answers of the research sample were analyzed using the statistical program (SPSS). The percentage weights and the factorial analysis method were used also to arrange the variables that affected on changing consumption patterns. The research reached a set of conclusions:
... Show MoreThis study analyses six political cartoons selected based on their relevance to current Iraqi political issues, specifically the period between 2005 and 2015, from American online newspapers (calgecartooms.com). The selection criteria included the cartoons' satirical elements, visual rhetoric, and their ability to engage with themes such as power dynamics, social issues, and public opinion. It sheds light on how these cartoons can function as mediators of meanings between the cartoonists and the readers. The data is examined using multimodal discourse analysis (MDA), which combines language study with the analysis of other visual elements, like colors, gestures, and images, to understand meaning (O’Halloran et al., 2011). The Visual Socia
... Show MoreThe transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the
... Show Moreتعتمد فرضية البحث على وجود ظاهرة عامة في إعمال المقاولات لدى المقاولين وهي
تجاوز الكلف الحقيقية المصروفة خلال مرحلة التنفيذ عن الكلف التخمينية للمقاولات الإنشائية
في مرحلة تقديم العطاء مما يسبب العجز المالي والمشاكل الاقتصادية للمقاولين.تبنى البحث
دورة حياة بناء النظام التي تمر بمراحل مختلفة هي تحديد المشكلة وتحليلها وتصميم النظام
الإداري المقترح.ولانجاز ذلك تم دراسة النظم العالمية والمحلية المع
In this study, we made a comparison between LASSO & SCAD methods, which are two special methods for dealing with models in partial quantile regression. (Nadaraya & Watson Kernel) was used to estimate the non-parametric part ;in addition, the rule of thumb method was used to estimate the smoothing bandwidth (h). Penalty methods proved to be efficient in estimating the regression coefficients, but the SCAD method according to the mean squared error criterion (MSE) was the best after estimating the missing data using the mean imputation method
The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show Moreدور مكننة المعلومات المحاسبي في اتخاذ القرارات
اتسعت دائرة استخدام نظم المعلومات بشكل كبير بحيث دخلت كل مفاصل حياة الانسان المختلفة مما جعل فرص انتهاك واختراق تلك الانظمة امراً لامناص منه. لذلك فان الحاجة تستدعي ايجاد وسائل تقنية واطر جوهرية للتصدي لظاهرة حدوث أي خلل في نظم المعلومات من خلال مراجعة وتدقيق دورة حياة النظام.
يتطرق البحث الى جملة ادوات واساليب تقنية تساعد المدققين والمراجعين من تحديد الخلل وطبيعته وايجاد حل له . كما توفر
... Show Moreان العولمة هي ظاهرة العصر وبحكم شمولية ابعادها وعمق اثارها اصبحت قضيتها تثير جدلا واسعا بين الباحثين (واصحاب القرار) متضمنا المصطلح والمفهوم والتجليات والمضمون والوسائل والاهداف، ولقد بدأت ملامح وخصائص هذه الظاهرة تتسارع لتشكل الهندسة الجديدة لاقتصاد القرن الحادي والعشرين وفي ظل هذا الاتجاه نحو تقسيم العمل الدولي ظهرت نتائج ومزايا عكست مديات التغيرات على مجمل الحياة الاقتصادية والاجتماعية للمجتمعا
... Show More