This research a study model of linear regression problem of autocorrelation of random error is spread when a normal distribution as used in linear regression analysis for relationship between variables and through this relationship can predict the value of a variable with the values of other variables, and was comparing methods (method of least squares, method of the average un-weighted, Thiel method and Laplace method) using the mean square error (MSE) boxes and simulation and the study included fore sizes of samples (15, 30, 60, 100). The results showed that the least-squares method is best, applying the fore methods of buckwheat production data and the cultivated area of the provinces of Iraq for years (2010), (2011), (2012), (2013), (2014).
The book The Laws of Duwan of Mamati's Son (T, 606 E) His approach to his narratives is a topic of historical and civilized importance. The Fatimid Age of the People of Jehovah has expanded its influence and authority, including ministers, writers, doughnuts and foreshores. One of the Christian families that shined in the late Fatmi era was "Mamati", who lived in "Assiut" from Upper Egypt, then moved to Cairo, and enrolled in the service of the Fatimids, where their sons held important positions in State offices.Ibn Mamati became in charge of the Army Office and then added to it the Finance Office, which became the most important downs in Egypt. Through his work in the Duwan Law Books, this book was a living record of the Dawawans in the Ay
... Show MoreToday, urban Stormwater management is one of the main concerns of municipalities and stakeholders. Drought and water scarcity made rainwater harvesting one of the main steps toward climate change adaptation. Due to the deterioration of the quality of urban runoff and the increase of impermeable urban land use, the treatment of urban runoff is essential. Best Management Practice (BMP) and Low Impact Development (LID) approaches are necessary to combat climate change consequences by improving the quantity and quality of water resources. The application of Bioswales along urban streets and roadways can reduce the stress on water resources, recharge groundwater and prevent groundwater pollution. While Sulaymaniyah City has a
... Show MoreThis paper deals with load-deflection behavior the jointed plain concrete pavement system using steel dowel bars as a mechanism to transmit load across the expansion joints. Experimentally, four models of the jointed plain concrete pavement system were made, each model consists of two slabs of plain concrete that connected together across expansion by two dowel bars and the concrete slab were supported by the subgrade soil. Two variables were dealt with, the first is diameter of dowel bar (12, 16 and 20 mm) and the second is type of the subgrade soil, two types of soil were used which classified according to the (AASHTO): Type I (A-6) and type II (A-7-6). Experimental results showed that increasing dowel bar diameter from 12 mm to 20 mm
... Show MoreDifferent percents(1.0,2.5,5.0 and 10)wt%of MgO powders were added to ZnO powder to study their effects on the physical properties of ZnO.Density, porpsity and water absorption of ZnO were decreased as MgO weigth percentage content increased. The values of vickers hardneess have double values especially at 1.0 wt % of MgO.
Eighty five samples were taken from patients suffering from pneumonia. Seventy-eight isolates were diagnosed as following: Staphylococcus aureus (23), klebsiella pneumoniae (29), Streptococcus pneumoniae (15), Serratia sp. (4), Haemophilus influenzae (4) and Pseudomonas aeruginosa (3). The clinical isolates were tested for antibiotics sensitivity. They appeared highly resistance to penicillin G and Ampicillin at percentage 89.7 and 84.6% respectly while the results showed highly sensitivity to streptomycin at percentege of (12.8%). To study the antibacterial activity of Alium sativum, Eucalyptus microtheca leaves and Cydonia oblonga seeds extracts, five multi resistant strains were used by using agar well diffusion and disk methods at c
... Show MoreBackground: The purpose of this study is to investigate the relationship between the roots of the maxillary posterior teeth and the maxillary sinus using spiral computed tomography, and measured the distances between the roots of the maxillary posterior teeth and the sinus floor. Materials and Methods: The sample of the present study was a total of 120 Iraqi subject (60 males & 60 females) aged (20-60) years old, who admitted to spiral Computed Tomography scan unit in AL-Zahraa hospital in AL-Kut city to have Computed Tomography scan of the brain and paranasal sinuses who had complaints of headaches or with suspicion of sinusitis but without pathological findings in maxillary sinuses. From November 2012 to April 2013, CT sagittal reconstruc
... Show MoreAim: The current study was aimed to determine the relationship between the orthodontic force applied by monobloc and the salivary level of alkaline phosphatase (ALP) and lactate dehydrogenase (LDH) enzymes, considering the time factor after insertion of the appliance and whether there is a correlation between these enzymes. Materials and methods: A sample of 28 growing patients requiring orthodontic treatment with myofunctional appliance (Monoblock) was taken for the current study with an age range 9 to 12 years,all patients had Angle's class II division 1 malocclusion with no or mild crowding, the sample was selected using simple random sampling. Only 16 subjects (10 males and 6 females) were included who follow certain inclusion criteria.
... Show MoreCyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions
... Show More