The current paper proposes a new estimator for the linear regression model parameters under Big Data circumstances. From the diversity of Big Data variables comes many challenges that can be interesting to the researchers who try their best to find new and novel methods to estimate the parameters of linear regression model. Data has been collected by Central Statistical Organization IRAQ, and the child labor in Iraq has been chosen as data. Child labor is the most vital phenomena that both society and education are suffering from and it affects the future of our next generation. Two methods have been selected to estimate the parameter of linear regression model, one Covariate at a Time Multiple Testing OCMT. Moreover, the Euclidian Distance has been used as a comparison criterion among the three methods
In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using
... Show MoreThere are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com
... Show MoreThe current study aims at investigating the effect of cooperative learning (Jigsaw) on motivation of female students. Department of kindergarten to learn Human biology. This is of be dove through verification of the hypothesis that there is no significant difference at the 0.05 level between the motivation of experiment of group subjects who study according to (Jigsaw) cooperative learning and that of the control group subjects who study traditionally.
The study is limited to female students al the first year-Department of kindergarten college of Education for women university of Baghdad during the academic year 2007-2008.
An experiment of design of partial control and post-test for two groups is used. The experiment groups consist
The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.
With the fast progress of information technology and the computer networks, it becomes very easy to reproduce and share the geospatial data due to its digital styles. Therefore, the usage of geospatial data suffers from various problems such as data authentication, ownership proffering, and illegal copying ,etc. These problems can represent the big challenge to future uses of the geospatial data. This paper introduces a new watermarking scheme to ensure the copyright protection of the digital vector map. The main idea of proposed scheme is based on transforming the digital map to frequently domain using the Singular Value Decomposition (SVD) in order to determine suitable areas to insert the watermark data.
... Show MoreIn this paper, we will show that the Modified SP iteration can be used to approximate fixed point of contraction mappings under certain condition. Also, we show that this iteration method is faster than Mann, Ishikawa, Noor, SP, CR, Karahan iteration methods. Furthermore, by using the same condition, we shown that the Picard S- iteration method converges faster than Modified SP iteration and hence also faster than all Mann, Ishikawa, Noor, SP, CR, Karahan iteration methods. Finally, a data dependence result is proven for fixed point of contraction mappings with the help of the Modified SP iteration process.
Background: The optimal timing of surgery for Wilms' tumor has been debated for many years. It appears dubious whether surgical ease or per operative complications consistently improved after preoperative chemotherapy.
Materials and Methods: This is a cross section study ,the sample collected from January 2009 to November 2012 .Thirty four patients were selected after informed consent . Patients aged between 10 months and 5 years who were newly diagnosed with Wilms' tumors. including (17) patients with unilateral wilms tumors received immediate nephrectomy without preoperative chemotherapy according to the National Wilms' Tumor Study Group protocol and (1
... Show MoreAleksandr Isayevich Solzhenitsyn was born in 1918 in Kislovodsk. His father was educated, and despite his peasantry origin, he got a university degree. Unfortunately, however, Solzhenitsyn could not recognize his father, for he died before his birth.
Solzhenitsyn was accused of being an opponent to the Soviet Union due to his activities of that time. He was exiled to a forced labour camp for eight years, on the surroundings of Moscow. He spent three years in Kazakhstan, and was sent to the life exile. He was set free in 1956. He worked as a teacher in in rural schools in Vladimir and then in Rezhran.
His greatest works were in the reign of Kherchov, and in 1962 appeared his story under the title of "One day in
... Show MoreIn-situ measurements of ultraviolet (UV) and solar irradiance is very sparse in Nigeria because of cost; it is estimated using meteorological parameters. In this work, a low-cost UV and pyranometer device, using locally sourced materials, was developed. The instrument consists of a UV sensor (ML8511), a photodiode (BPW34) housed in a carefully sealed vacuumed glass bulb, the UV and solar irradiance sensor amplifiers, a 16-bit analog-to-digital converter (ADS1115), Arduino mega 2560, liquid crystal display (LCD) and microSD card for data logging. The designed amplifier has an offset voltage of 0.8676 mV. The sensitivity of the irradiance device is 86.819 Wm-2/mV with a correcting factor of 27.77 Wm-2 and a
... Show MoreIn this research we solved numerically Boltzmann transport equation in order to calculate the transport parameters, such as, drift velocity, W, D/? (ratio of diffusion coefficient to the mobility) and momentum transfer collision frequency ?m, for purpose of determination of magnetic drift velocity WM and magnetic deflection coefficient ? for low energy electrons, that moves in the electric field E, crossed with magnetic field B, i.e; E×B, in the nitrogen, Argon, Helium and it's gases mixtures as a function of: E/N (ratio of electric field strength to the number density of gas), E/P300 (ratio of electric field strength to the gas pressure) and D/? which covered a different ranges for E/P300 at temperatures 300°k (Kelvin). The results show
... Show More