The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances. From the diversity of Big Data variables comes many challenges that can be interesting to the researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter of linear regression model, one Covariate at a Time Multiple Testing OCMT. Moreover, the Euclidian Distance has been used as a comparison criterion among the three methods
Praise be to Allah, Lord of the Worlds, and peace and blessings be upon our Lord and Beloved Muhammad and his family and companions.
The altruistic submission of the other human himself in matters of the world satisfactory to God Almighty with his need and does not come out limit want and destruction. The approach of the Koran in the income creation altruism education for the individual curriculum that includes types of altruism, including Mahmoud and vilified. Ether world life on the hereafter is a vilified type and its consequences are sterile on the existing in the world and in the hereafter a serious consequence, which is special Madiat. On the principle and preference of the doctrine over the doctrine, the Koran has been interest
To learn about the importance of ethics in different historical eras have to be identified first on the roots of this concept and return to the origins of language and the statement connotations Home as a morality single won Position good in the literature of the Arabic language , and beliefs of the monotheistic religions that see the majority it had on moral grounds .
The name of the morality of the natural qualities of a human being , or the name of human nature itself , and morality , plural ( created) is the name of the inner configuration of this man , but Valkhalq put against the word of creation - which is the name of this human form evolving .
In the opinion of other references that word ( ethics ) but they are collecting f
Visual discourse in cinema and television is an expressive medium that carries its audio and visual elements and is effective in influencing the memory of the recipient, according to multiple patterns of forms and representations aimed at persuasion, influence, entertainment, enjoyment and knowledge. This speech will not pass by the recipient without difficulty, as the multiplicity of forms and techniques of image presentation and the diversity of contents derived from different beliefs, concepts, ideas and perceptions may sometimes reach intersections and conflicts, which is reflected in the form of the screen and the theory of television. This motivates us to know the ways in which audio-visual discourse is produced on television, whic
... Show MoreThe concept of equality in Islamic thought emanates from the unity of human entity that does not breach the concept of equality in itself and it should take differentiation among people as means for development and growth not as excuse for injustice and discrimination. Islamic thought has left all the prevailing norms of differentiation such as (weakness and strength, economic and social position, gender, color, and social class). Islamic thought has underscored the quality of people of different race, race, color, and language which was not familiar in those civilizations before the emergence of Islam such as (Egyptian, Persian, roman civilization). It was common to divide people into different social classes. The aim of Islam is to kee
... Show MoreThe present study aims to shed light on psychological intentions in some prophetic hadiths and present practical models and realistic applications that reveal the aim behind Prophet Mohammed’s actions and speech. This study relied on a descriptive and deductive approach. It included three demands. The first demand provided a glimpse of the theoretical and conceptual framework of psychological intentions and their most important classifications. The second request tackled the history of Makassed thought in the Prophet’s hadiths. The third requirement dealt with the presentation of the physical, mental, and psychological intentions in Sunnah. The results revealed that The Islamic religion seeks to achieve happiness for the human being
... Show MoreMedical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in
... Show MoreThe primary goal of the study is to practise some systematic strategies for foreign language instruction despite the fact that no single approach to language classroom instruction is inherently superior to others; instead the choice of an approach should be determined by the teacher, students, the subject matter, and the situation. The paper adopts certain strategies which may assist EFL teachers to excel in their work and continue their professional development. Hence, it is intended for language teachers who understand the value of good teaching and like to produce academically successful students. The study could also help college student teachers to acquire new strategies in order not only to succeed but also to excel in their learni
... Show MoreAs a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put
... Show More