In this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method
Persuasion is an indispensable skill in everyday life; that is why, it has aroused researchers’ interest. This study aims to investigate the most frequently used persuasive strategies in texting WHO COVID-19 Virtual Press Conferences and explore how these strategies are employed to achieve persuasive messages.To this end, a text of WHO COVID-19 Virtual Press Conferences has been chosen randomly to be analyzed based on Dillard and Shen’s (2013) “Persuasive strategies in Health Campaigns”. A qualitative method has been adopted in analyzing the selected data to investigate the credibility and validity of the persuasive strategies used in such a domain. Findings have shown that most of the persuasive appeals based on the adopted mode
... Show MoreThe research has focused on accounting for marketing risks faced by banks because they are exposed to a high level of risk as a result of their great utilization of financial instruments, which may make them liable to insolvency or bankruptcy and collapse, and accordingly to major economic crises. Therefore, banks are required to manage (reduce) risks so as to prevent them. As Iraqi banks don't manage these risks according to modern methodology of using derivatives, as well as lack of both the standard accounting system for banks and the Iraqi accounting criterion (standard) No. 10 to an obvious methodology for these risks identification, classification, hedging and disclosure, the researchers was prompted to concentrate
... Show Moreاهمية البحث هي مرحلة نمو وبناء اجهزة الجسم للاعبين الاشبال واعداد تدريبات بأسلوب التدريب الدائري لبناء التحمل لتطوير بعض القدرات الحركية والمهارية لدى اللاعبين الاشبال بكرة القدم , حيث لاحظت الباحثة ضعف في مستوى الاداء الحركي ارتأت اعداداً بدنيا ومهارياً منذ مرحلة البناء الأولى للاعب الفئات العمرية , واستخدم الباحث المنهج التجريبي بالاختبار القبلي والبعدي للمجموعتين التجريبية والضابطة لملائمته لطبيعة ال
... Show MoreThe interleukin-1 family has multifaceted roles in men٫s reproductive syste. Out of these is interleukin-1 receptor antagonist (IL-1RN) which exists in men gonads, and in case of infection and inflammatory process, its activity is increased. The current study aims to verify a possible linkage of Variable Number Tandem Repeat (VNTR) polymorphism of the IL-1RN gene with human men infertility. The study groups enrolled included 100 infertile men and 100 fertile and healthy men. Their seminal fluids were subjected to analysis. Also peripheral blood samples were collected for the assessment or detection of polymorphic Variable Number Tandem Repeats (VNTR) polymorphism of interleukin-1 receptor antagonist gene (IL-1RN). Two a
... Show Moreتعد أساليب وطرائق تدريس المواد الدراسية العلمية من المجالات المهمة التي تساعد في تحويل المجرد إلى ثوابت في الذهن وترفع مستوى خبرات كل من المعلم والمتعلم على حد سواء إضافة إلى إنها جزء لا يتجزأ من العملية التربوية ومن الركائز المهمة التي تقوم عليها المناهج الدراسية لأنها تساعد الطلبة على اكتساب مهارات ومعلومات وتكوين اتجاهات وميول تخدم أهداف تدريس المادة وبما أن مادة الكيمياء الكمية هي إحدى المواد الدراسية
... Show MoreThe nucleon momentum distributions (NMD) for the ground state and elastic electron scattering form factors have been calculated in the framework of the coherent fluctuation model and expressed in terms of the weight function (fluctuation function). The weight function has been related to the nucleon density distributions of nuclei and determined from theory and experiment. The nucleon density distributions (NDD) is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of long-tail behavior at high momentum region of the NMD has been obtained using both the theoretical and experimental weight functions. The observed ele
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Nowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.
This work presents a comparison between the Convolutional Encoding CE, Parallel Turbo code and Low density Parity Check (LDPC) coding schemes with a MultiUser Single Output MUSO Multi-Carrier Code Division Multiple Access (MC-CDMA) system over multipath fading channels. The decoding technique used in the simulation was iterative decoding since it gives maximum efficiency at higher iterations. Modulation schemes used is Quadrature Amplitude Modulation QAM. An 8 pilot carrier were
used to compensate channel effect with Least Square Estimation method. The channel model used is Long Term Evolution (LTE) channel with Technical Specification TS 25.101v2.10 and 5 MHz bandwidth bandwidth including the channels of indoor to outdoor/ pedestrian