Maulticollinearity is a problem that always occurs when two or more predictor variables are correlated with each other. consist of the breach of one basic assumptions of the ordinary least squares method with biased estimates results, There are several methods which are proposed to handle this problem including the method To address a problem and method To address a problem , In this research a comparisons are employed between the biased method and unbiased method with Bayesian using Gamma distribution method addition to Ordinary Least Square method, We will use the simulation to compare these methods using the mean squares error criteria. The method of biased gave good results by using sizes different samples.
Background : Breast cancer is the most common cancer of
women. When breast cancer is detected and treated early,
the chances for survival are better. Surgery is the most
important treatment for non-metastatic breast cancer.
Al-Kindy Col Med J 2008 Vol.5(1) 40 Original Article
Objectives : The aim of this study is to review different
clinical presentation and to evaluate types of surgical
procedures and complications in treatment of nonmetastatic breast cancer.
Method : During the period from Jun 1998 to May 2005,
93 patients with non-metastatic breast cancer were
diagnosed and treated surgically in 2 hospitals in Baghdad (
Hammad Shihab military hospital and Al-Kindy teaching
hospital).
Results : Wo
In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including: network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de
... Show MoreHumans knew writing and to blog motivated by the need for registration and documentation, and tried from the very beginning of research to find the most suitable material for this purpose, he used many different materials in form, nature, and composition, so it is written on the mud by the ancient Sumerian people in different forms and when the text is long Numbered as the pages of the book at the present time, this research will deal with the damage to manuscripts and then find ways to address them.
In this paper, introduce a proposed multi-level pseudo-random sequence generator (MLPN). Characterized by its flexibility in changing generated pseudo noise (PN) sequence according to a key between transmitter and receiver. Also, introduce derive of the mathematical model for the MLPN generator. This method is called multi-level because it uses more than PN sequence arranged as levels to generation the pseudo-random sequence. This work introduces a graphical method describe the data processing through MLPN generation. This MLPN sequence can be changed according to changing the key between transmitter and receiver. The MLPN provides different pseudo-random sequence lengths. This work provides the ability to implement MLPN practically
... Show MoreGeomechanical modelling and simulation are introduced to accurately determine the combined effects of hydrocarbon production and changes in rock properties due to geomechanical effects. The reservoir geomechanical model is concerned with stress-related issues and rock failure in compression, shear, and tension induced by reservoir pore pressure changes due to reservoir depletion. In this paper, a rock mechanical model is constructed in geomechanical mode, and reservoir geomechanics simulations are run for a carbonate gas reservoir. The study begins with assessment of the data, construction of 1D rock mechanical models along the well trajectory, the generation of a 3D mechanical earth model, and runni
This study was aimed to investigat integrated system for in vitro growth of paulownia plants by assessing the efficacy of chlorine dioxide (ClO2) as an alternative to autoclave in sterilizing culture medium. Therefore, this study was devised to compare autoclave sterilization at three different times (5, 10, and 15) minutes and three different concentrations of ClO2 (0, 0.4, 0,8, 1) mg/L. The results showed that, compared with (0.4) mg/L concentration, concentrations of (0.8 and 1) mg/L are more effective at sterilizing the culture medium. ClO2 sterilization improved individual single node growth more than autoclave sterilization. Since ClO2 is non-toxic, it could be used as a safe alternative to autoclave when propagating paulown
... Show MoreThis study investigates data set as satellite images of type multispectral Landsat-7, which are observed for AL_Nasiriya city, it is located in southern of Iraq, and situated along the banks of the Euphrates River. These raw data are thermal bands of satellite images, they are taken as thermal images. These images are processed and examined using ENVI 5.3 program. Consequently, the emitted Hydrocarbon is extracted, and the black body algorithm is employed. As well as, the raster calculations are performed using ArcGIS, where gas and oil features are sorted. The results are estimate and determine the oil and gas fields in the city. This study uncovers, and estimates several unexplored oil and gas fields. Whereas,
... Show MoreSteganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file. In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,
... Show MoreThis paper treats the interactions among four population species. The system includes one mutuality prey, one harvested prey and two predators. The four species interaction can be described as a food chain, where the first prey helps the second harvested prey. The first and the second predator attack the first and the second prey, respectively, according to Lotka-Volterra type functional responses. The model is formulated using differential equations. One equilibrium point of the model is found and analysed to reveal a threshold that will allow the coexistence of all species. All other equilibrium points of the system are located, with their local and global stability being assessed. To back up the conclusions of the mathema
... Show More