Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the parametric part, a method has been developed to estimate the parametric of the partial linear regression model represented by weighted estimators as well as by the suggested method (EMBW). Two methods of the simulation were compared using three sizes (n = 100,150,200) and using three different values for and zero mean and it was found that the proposed method (EMBW) was superior to the weighted estimator method.
In this paper, a new class of non-convex functions called semi strongly (
Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreThe evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities. Cloud computing can be used to store big data. The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r
... Show MoreLet R be a commutative ring with identity 1 ¹ 0, and let M be a unitary left module over R. A submodule N of an R-module M is called essential, if whenever N ⋂ L = (0), then L = (0) for every submodule L of M. In this case, we write N ≤e M. An R-module M is called extending, if every submodule of M is an essential in a direct summand of M. A submodule N of an R-module M is called semi-essential (denoted by N ≤sem M), if N ∩ P ≠ (0) for each nonzero prime submodule P of M. The main purpose of this work is to determine and study two new concepts (up to our knowledge) which are St-closed submodules and semi-extending modules. St-closed submodules is contained properly in the class of closed submodules, where a submodule N of
... Show MoreBackground: Radiologic evaluation of breast lesions is being achieved through several imaging modalities. Mammography has an established role in breast cancer screening and diagnosis. Still however, it shows some limitations particulary in dense breast.
Methods : Magnetic resonance imaging is an attractive tool for the diagnosis of breast tumors1 and the use of magnetic resonance imaging of the breast is rapidly increasing as this technique becomes more widely available.1 As an adjunct to mammography and ultrasound, MRI can be a valuable addition to the work-up of a breast abnormality. MRI has the advantages of providing a three-dimensional view of the breast, performing wit
... Show MoreThe indirect monetary policy tools led to financial stability for the period being studied through the use of indicators of financial stability (aggregate) to show the effect of the foreign reserves of the Central Bank of Iraq and its indirect instruments in achieving financial and economic stability, especially after the significant decline in oil prices and dependence of the Iraqi economy on Oil (rent) and lower reserves of the Central Bank of Iraq after 2014 and now compared to previous years, the goal of this research is to achieve financial stability according to selected indicators and achieve an optimal monetary policy to achieve the development goals of The economic policy in the country. Standard models were used to test
... Show MoreZeolite Y nanoparticles were synthesized by sol - gel method. Dffirent samples using two silica sources were prepared.
Sodium metasilicate (Na2SiO3) (48% silica) and silicic acid silica (H2SiO3) (75% silica) were employed as silica
source and aluminum nitrate (Al(NO3)3.9H2O) was the aluminum source with tetrapropylammonium hydroxide
(TPAOH) as templating agent.
The synihesized-samples were characterized by X-ray diffraction, showed the requirement of diffirent aging time for
complete crystallization to be achieved. Transmission Electronic Microscope (TEM) images, showed the particles were
in the same range of 30 - 75 nm. FT-IR spectroscory, showed the synthesized samples having the zeolite Y crystal
properties. The i
The UV−VIS absorption spectroscopy technique was used to study the formation of a new complex of charge transfer (CT) between bioactive organic molecules as (Nystatin) containing both a π-electrons from a conjugated system and lone-pair of electrons (amine) with Tetrachloro-1,4 benzoquinone (TCBQ) as a π-acceptor in which the transferred electron goes into its vacant anti-bonding molecular orbitals. The Tyrian purple-colored complex formed was quantitatively measured at 544 nm. This complex shows obeying Beer's law within the concentration range of (10-90) μg.ml-1The stoichiometry of the formed complex between the (Nys.) and (TCBQ) was found 1:2 as evaluated by continuous variation (Job's method) and mole ratio method The value of mola
... Show MoreCurrent research sought to evaluate the performance and results of employees in accordance with normative to people and people result for the European model of excellence EFQM 2013 quality management Foundation in the Inspector General's Office/Ministry of health, so as to pursue a modern and advanced management methods in evaluating performance and the performance of the Office's relationship with a citizen's life, since it takes him beyond the accepted service capabilities today, but it became budget duties between dealers servicing responsibilities and future planning, financial control, competitiveness, human resources needs and maintaining quality and continuous improvement and development as well as The primary role of the
... Show MoreEbastine (EBS) is a poorly water-soluble antihistaminic drug; it belongs to the class II group according to the biopharmaceutical classification system (BCS). The aim of the present work was to enhance the solubility, dissolution rate and micromeritic properties of the drug, by formulating it as spherical crystal agglomerates by Quasi Emulsion Solvent Diffusion (QESD) method.
Spherical crystal agglomerates (SCAs) were prepared in presence of three solvents dichloromethane (DCM), water and chloroform as a good solvent, poor solvent and bridging solvent respectively. Agglomeration of EBS involved the use of some hydrophilic polymers like polyethylene glycol 4000 (PEG 4000), polyvinyl pyrrolidine K30 (PVP K30), D-?-tocopheryl
... Show More