The non static chain is always the problem of static analysis so that explained some of theoretical work, the properties of statistical regression analysis to lose when using strings in statistic and gives the slope of an imaginary relation under consideration. chain is not static can become static by adding variable time to the multivariate analysis the factors to remove the general trend as well as variable placebo seasons to remove the effect of seasonal .convert the data to form exponential or logarithmic , in addition to using the difference repeated d is said in this case it integrated class d. Where the research contained in the theoretical side in parts in the first part the research methodology has been through a presentation , the emphasized the importance of research on the mind a new addition for the professionals and researchers in this area. In the second part , we have introduced the concept of system of simultaneous equation for the method of combining CT data and time series . using fixed effects for the periods and groups once and use them without a second time . Also has been the conditions diagnosis model used in the analysis , which includes the police rank and oich includes the police rank and order in addition to illustrate the urder in addition to illustrate the use of a method of least squares two –stage built in appreciation of the data used in the research as well as view to test the fixed effects for each of the groups and period . in addition to the concept of testing Phillips-perron (Philips-peron). The research problem can be summarized in the thirastoqania data CT, which was detected using the test Phillips –perron (Philips-peron) and the level of the series and the difference first & second data scan (panel data) and each of the fixed effect of the peviods and groups, and also the goal of research and its premises and the nature of the variables used and where they develop. In the practical side , were presented results of the assessment system of simultaneous equation used in the research and for the period (1990-2005), disaggregated by type of estimation method and the function of each sector (pubic ,mixed , cooperative ,private ) separately.
An analytical approach based on field data was used to determine the strength capacity of large diameter bored type piles. Also the deformations and settlements were evaluated for both vertical and lateral loadings. The analytical predictions are compared to field data obtained from a proto-type test pile used at Tharthar –Tigris canal Bridge. They were found to be with acceptable agreement of 12% deviation.
Following ASTM standards D1143M-07e1,2010, a test schedule of five loading cycles were proposed for vertical loads and series of cyclic loads to simulate horizontal loading .The load test results and analytical data of 1.95
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreMalicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreA two time step stochastic multi-variables multi-sites hydrological data forecasting model was developed and verified using a case study. The philosophy of this model is to use the cross-variables correlations, cross-sites correlations and the two steps time lag correlations simultaneously, for estimating the parameters of the model which then are modified using the mutation process of the genetic algorithm optimization model. The objective function that to be minimized is the Akiake test value. The case study is of four variables and three sites. The variables are the monthly air temperature, humidity, precipitation, and evaporation; the sites are Sulaimania, Chwarta, and Penjwin, which are located north Iraq. The model performance was
... Show MoreLongitudinal data is becoming increasingly common, especially in the medical and economic fields, and various methods have been analyzed and developed to analyze this type of data.
In this research, the focus was on compiling and analyzing this data, as cluster analysis plays an important role in identifying and grouping co-expressed subfiles over time and employing them on the nonparametric smoothing cubic B-spline model, which is characterized by providing continuous first and second derivatives, resulting in a smoother curve with fewer abrupt changes in slope. It is also more flexible and can pick up on more complex patterns and fluctuations in the data.
The longitudinal balanced data profile was compiled into subgroup
... Show MoreThe current study included measuring the percent of protein in the extract of nematode Ascaridia galli that infect chickens, it was 1.157% and equivalent to 11.570 mg /L., as well as the amino acid analysis in the nematode A.galli by using a high-performance liquid chromatography technique (HPLC), as was detect five types for amino acids in this extract Leucine, Threonin, Serine, Methionine and Valine as the amount of these amino acids in the extract was as follows 132.973, 26.994, 10.453, 2.243 and 1.888 mg /L., respectively, and other amino acids which Glutamic, Histidine and Tyrosin did not exist in the nematode A.galli.
This study aimed at highlighting the role of small and medium enterprises in bringing about economic development in Jordan. The study examined the impact of the number, size of investment and the number of jobs provided by these enterprises on the rate of growth in gross domestic product (GDP) as an indicator for economic development. To achieve its objectives, the study adopted descriptive and quantitative analysis. A linear multi regression model was developed with a growth rate of GDP as dependent variable and the number of institutions, size of investment, and the number of job opportunities as independent variables. The study concluded that each increase by one small or medium enterprise lead to an increase in the rate of gr
... Show MoreNosocomial infections (NIs) are hospital-acquired associated infections, and also contracted due to the infections or toxins that exist in some location, like hospital. Therefore in our study, 4 Lactic acid bacteria (LAB) isolates were obtained from dairy product (Lactobacillus brevis, L. acidophilus, Lactococcus raffinolactis and Lactococcus lactis) and were tested for Bacteriocin production to select Lactococcus lactis among them. Cell free supernatant (CFS), Lipid and partial purification of protein La. Lactis had high inhibitory effect against test pathogens (E. coli, Bacillus cereus, Staphylococcus aureus and Streptococcus). 30 isolates that diagnosed by Vitec, were isol
... Show MoreThis study focused on a fundamental issue which was represented by ability of Iraqi central bank in facing the difficulty of determining the optimal ratio of liquidity in the Iraqi banks in terms of the balancing between its obligations to the depositors and borrowers, and liquidate their funds on one hand and the risks on the other hand.the search aimed for achieving the goals which represented by identifying the possibility of Iraqi banks to apply the regulations rules and instructions issued by central bank of Iraq in determining ratio of liquidity and its appropriate with Iraqi banks action to implement a reasonable profit to&
... Show More