The survival analysis is one of the modern methods of analysis that is based on the fact that the dependent variable represents time until the event concerned in the study. There are many survival models that deal with the impact of explanatory factors on the likelihood of survival, including the models proposed by the world, David Cox, one of the most important and common models of survival, where it consists of two functions, one of which is a parametric function that does not depend on the survival time and the other a nonparametric function that depends on times of survival, which the Cox model is defined as a semi parametric model, The set of parametric models that depend on the time-to-event distribution parameters such as Exponential Model, Weibull Model, Log-logistic Model. Our research aims to adopt some of the Bayesian Optimal Criteria in achieving optimal design to estimate the optimal survival time for patients with myocardial infarction by constructing a parametric survival model based on the probability distribution of the survival times of myocardial infarction patients, which is among the most serious diseases that threaten human life and the main cause of death all over the world, as the duration of survival of patients with myocardial infarction varies with the factor or factors causing the injury, there are many factors that lead to the disease such as diabetes, high blood pressure, high cholesterol, psychological pressure and obesity. Therefore, the need to estimate the optimal survival time was expressed by constructing a model of the relationship between the factors leading to the disease and the patient survival time, and we found that the optimal rate of survival time is 18 days.
These search summaries in building a mathematical model to the issue of Integer linear Fractional programming and finding the best solution of Integer linear Fractional programming (I.L.F.P) that maximize the productivity of the company,s revenue by using the largest possible number of production units and maximizing denominator objective which represents,s proportion of profits to the costs, thus maximizing total profit of the company at the lowest cost through using Dinkelbach algorithm and the complementary method on the Light industries company data for 2013 and comparing results with Goal programming methods results.
It is clear that the final results of resolution and Dinkelbac
... Show MoreIn this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease error
... Show MoreThis paper discusses estimating the two scale parameters of Exponential-Rayleigh distribution for singly type one censored data which is one of the most important Rights censored data, using the maximum likelihood estimation method (MLEM) which is one of the most popular and widely used classic methods, based on an iterative procedure such as the Newton-Raphson to find estimated values for these two scale parameters by using real data for COVID-19 was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. The duration of the study was in the interval 4/5/2020 until 31/8/2020 equivalent to 120 days, where the number of patients who entered the (study) hospital with sample size is (n=785). The number o
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe research aims to show the impact that the information of the supporting bodies can have and its dimensions represented by (information credibility, efficiency and effectiveness of information, cooperation with the tax administration, obligating the taxpayer, accuracy and completeness of information and the appropriate time) in tax inventory, as well as clarifying the moral differences in The response of the surveyed sample according to the personal variables represented by (gender, educational attainment, scientific specialization, job title, years of service), and the descriptive analytical approach was adopted and in light of it, the questionnaire was designed as a main tool in collecting data from the sample of (80)
... Show MoreEffect of Using Computer in Getting and Remaining Information at Students of First Stage in Biology Subject MIAAD NATHIM RASHEED LECTURER Abstract The recent research goal is to know the influence of computer use to earn and fulfillment information for students of first class in biology material and to achieve that put many of the zeroing hypothesis by researcher as follow: There were no differences between statistical signs at level (0,05) between the average students' marks who they were study by using computer and between the average student ' marks who they were study in classical method of earning and fulfillment. The researcher chose the intentional of the medical technical institute that included of two branches the first class (A
... Show MoreThe aim of this research is to identify the impact of the effectiveness of digital transformation technology in improving the efficiency of the insurance service in the public insurance companies in Iraq through digital transformation technology in the insurance process "promotion of the insurance product, submission of insurance application, underwriting, settlement of losses" and to achieve this goal a questionnaire was designed A survey distributed in the surveyed community Which represents the decision makers in the researched companies under study, and one of the most important results of the research was the existence of a relationship between digital transformation and improving the efficiency of the insurance process, whether thr
... Show Moreتناولنا في بحثنا أحد اساليب البرمجة الخطية وهي الطريقة المبسطة لتقدير معلمات انموذج الانحدار الخطي عن طريق اختيار دالة الهدف التي تعمل على تقليل الحد الادنى لمجموع الاخطاء الناتجة من تقدير المعلمات بطريقة المربعات الصغرى الاعتيادية ( OLS) حيث سيتم في الطريقة المبسطة ( simplex) فرض قيود على نفس الاخطاء نفسها بهدف تصغيرها الى اقل ما يمكن للحصول على تقديرات افضل لمعلمات انموذج الانحدار الخطي . على اساس ان طريقة المرب
... Show MoreThere are numbers of automatic translation services that internet users can choose to automatically translate a certain text, and Google translate is one of these automatic services that proposes over 51 Languages. The present paper sheds light on the nature of the translation process offered by Google, and analyze the most prominent problems faced when Google translate is used. Direct translation is common with Google Translate and often results in nonsensical literal translations, particularly with long compound sentences. This is due to the fact that Google translation system uses a method based on language pair frequency that does not take into account grammatical rules which, in turn, affects the quality of the translation. The
... Show MoreAbstract
The research to have a clear perceptions about the knowledge value added to assess the knowledge resources of the Iraqi private banks, depending on the value added methodology of the proposed defined (Housel & Bell, 2001), which assumes that the knowledge value added come through synergetic relationship between knowledge resource and information technology, trying to the possibility of mainstream theory and its application in the Iraqi environment and interpretation of results, and on this basis was launched search of a research problem took root synergetic nature of the relationship between knowledge (human) resource and
... Show More