In this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method
Abstract:
This research aims to identify the type of cultural values prevailing in the Ramadi General Hospital, and Baghdad, educational, and whether the organization's culture values play a role in improving the quality of nursing care service in hospitals, and how different cultural values of the nurses between Ramadi Teaching Hospital and General education Baghdad Hospital because of the nature social and cultural Different each region, including the research sample of all nurses working in Baghdad Teaching Hospital, and Ramadi educational-General, adopted Find descriptive analytical approach adopted scale developer (Hofstede, 1991) and (Furrer et al, 2000) And pres
... Show MoreThe search in these subjects makes an importanl accomplishment in the study of the scientific life in that (era) specialy what the wonen had from a scientific and social level in that(age) the studies of the scientestis which were brilliant in the this era never hed the same as the first scientests . because of the common mistakes toward some resesrchers
The most important social and psychological problems that lead to Alzheimer's disease in the elderly (field study of a sample of people living in the city of Baghdad). The research aims to: 1. Identify the most important social, psychological and health problems of elderly people with Alzheimer's disease. 2. The most prominent solutions and treatments for people living with this disease. 3. rehabilitation and provision of social, psychological and medical services for people with Alzheimer's disease. The research stages of Alzheimer's disease and its symptoms and the most important causes of Alzheimer's disease, research has strengthened the theoretical framework. The theoretical study unexplained social pressure generating dealt with Al
... Show Moreتهدف هذه الدراسة إلى معرفة الفرق في التحصيل الدراسي في الكيمياء والاتجاه نحو العلوم بين طلاب التخصص العلمي وطلاب التخصص الصناعي الصف الأول كلية التربية ابن الهيثم، كذلك تهدف الدراسة إلى معرفة العلاقة بين التحصيل الدراسي في الكيمياء ودرجات اختبار نهاية الفصل في الكيمياء، والمعدل التراكمي بعد أخذ المقرر الدراسي والاتجاه نحو العلوم بالنسبة لطلاب التخصص العلمي وطلاب التخصص الصناعي.
لقد است
... Show Moreيختبر البحث الحالي علاقة الأثر والارتباط بين إدارة المعرفة التنظيمية (المتمثلة قيادة المعرفة، تنظيم المعرفة، عمليات المعرفة، ثقافة المعرفة، تطبيق المعرفة، تقاسم المعرفة) ومتغير (رأس مال الزبون) في مجموعة من المصارف الأهلية في محافظة النجف إذ تمثلت مشكلة الدراسة بمدى دور إدارة المعرفة في هذه المصارف فضلاً عن الزبائن الذين يتعاملون معها، وقد استخدمت استمارة الاستبيان كأداة رئيسة لجمع البيانات إذ تم تو
... Show MoreIrrigation scheduling techniques is one of the suggested solutions for water scarcity problem. The study aims to show the possibility of using practical and applicable irrigation scheduling program which was designed by Water Resources Department at the University of Baghdad by using Spreadsheet Formulas for Microsoft Excel program, version 2007, with some modification to generalize it and made it applicable to various climatic zone and different soil types, as a salvation for the shortage of irrigation water inside the irrigation projects. Irrigation projects which incidence of Tigris River basin will be taken as an applicable example. This program was based on water budgeting and programmed depending on scientific concepts which facili
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The nucleon momentum distributions (NMD) for the ground state and elastic electron scattering form factors have been calculated in the framework of the coherent fluctuation model and expressed in terms of the weight function (fluctuation function). The weight function has been related to the nucleon density distributions of nuclei and determined from theory and experiment. The nucleon density distributions (NDD) is derived from a simple method based on the use of the single particle wave functions of the harmonic oscillator potential and the occupation numbers of the states. The feature of long-tail behavior at high momentum region of the NMD has been obtained using both the theoretical and experimental weight functions. The observed ele
... Show MoreNowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio
... Show Moretock markets changed up and down during time. Some companies’ affect others due to dependency on each other . In this work, the network model of the stock market is discribed as a complete weighted graph. This paper aims to investigate the Iraqi stock markets using graph theory tools. The vertices of this graph correspond to the Iraqi markets companies, and the weights of the edges are set ulrametric distance of minimum spanning tree.