This research sought to present a concept of cross-sectional data models, A crucial double data to take the impact of the change in time and obtained from the measured phenomenon of repeated observations in different time periods, Where the models of the panel data were defined by different types of fixed , random and mixed, and Comparing them by studying and analyzing the mathematical relationship between the influence of time with a set of basic variables Which are the main axes on which the research is based and is represented by the monthly revenue of the working individual and the profits it generates, which represents the variable response And its relationship to a set of explanatory variables represented by the years of service of the working individual and the academic achievement of him and the classifier starting with (graduates of the intermediate school or below, graduates of the preparatory school, graduates of institutes, graduates of colleges and universities) Finally sex was divided into two categories: male and female The sample of the research is a group of individuals (100) individuals working in private sector companies with different commercial agencies in Baghdad with financial, administrative, technical, sales and services sectors, namely, the research community And then to extract the estimates of the parameters of the models and the Variations of errors as well as their testing and analysis where it was observed how to control the heterogeneity of variance and increase in degrees of freedom and less multicollinearity among the variables, which illustrates the efficiency and importance and accuracy of this type of models and their importance in making sound decisions and reliable results The results also showed the importance of the years of service on the performance of the working individual and the increase in productivity and efficiency, adding to the practical experience of utmost importance, as well as distinguished individuals working in the achievement of university degree on the rest of the other educational collections.
The term “non-violence” is a means of political, social, and advocacy that excludes force in reaching its objectives, and lacks infringement of the rights of non-violence. The policy of non-violence is a beautiful logic of the whole of Islamic creation, in that it is an integral part of the whole structure of Islam and it is a policy of brilliant and brilliant saying in the Almighty: `` Neither level nor good or bad, pay what is better, If that between you and him enmity as if he were intimate guardian (Suratvsalat, verse: 34. Has According to the prophet of Islam, it means that God gives to kindness (kindness) what does not give to violence (Sunan Abu Dawood, 4/255). These terms accurately communicate what is meant by violence and n
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreAPDBN Rashid, International Journal of Humanities and Social Sciences/ RIMAK, 2023
In this work, the adsorption of reactive yellow dye (Remazol yellow FG dye) by granular activated carbon (GAC) was investigated using batch and continuous process. The batch process involved determination the equilibrium isotherm curve either favorable or unfavorable by estimation relation between adsorption capacity and concentration of dye at different dosage of activated carbon. The results were fitted with equilibrium isotherm models Langmuir and Freundlich models with R2value (>0.97). Batch Kinetic study showed good fitting with pseudo second order model with R2 (0.987) at contact time 5 h. which provesthat the adsorption is chemisorptions nature. Continuous study was done by fixed bed column where breakthrough time was increased
... Show MoreBefore displaying that study we must clarify the nature of this area, wonderful, strange and great world of AL-Bateeha. Its life was simple, easy and comfortable –Human beings in this world were self-sufficient with regards to food, drinks and all other life requirements because and that of presence so many creatures there, for example, birds, fish and lots of plants that humans used as food for them and their animals. Therefore that area formed an isolated environment and far from incursion and uneasy to control
The study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More