This research introduce a study with application on Principal Component Regression obtained from some of the explainatory variables to limitate Multicollinearity problem among these variables and gain staibilty in their estimations more than those which yield from Ordinary Least Squares. But the cost that we pay in the other hand losing a little power of the estimation of the predictive regression function in explaining the essential variations. A suggested numerical formula has been proposed and applied by the researchers as optimal solution, and vererifing the its efficiency by a program written by the researchers themselves for this porpuse through some creterions: Cumulative Percentage Variance, Coefficient of Determination, Variance Inflation Factor and Estimation Stability.
Conflict is a common but complicated phenomenon. It has been extensively researched in many domains, including philosophy, sociology, psychology, and linguistics. Using the Critical Discourse Approach, this study examines the issue of self-society conflict in The Handmaid’s Tale. The significance of this work lies in the identification and explanation of the discursive strategies that force the ideological polarization of the positively portrayed self versus the negatively portrayed other. The purpose of this study is to answer two questions: what are the discursive strategies used in The Handmaid’s Tale to create a positive or negative representation, and how are these strategies implemented? Five extracts from The Handmaid’s
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
A fuzzy logic approach (FLA) application in the process of stud arc welding environment was implemented under the condition of fuzziness input data. This paper is composed of the background of FLA, related research work review and points for developing in stud welding manufacturing. Then, it investigates thecase of developingstud arc welding process on the controversial certaintyof available equipment and human skills.Five parameters (welding time, sheet thickness, type of coating, welding current and stud shape) were studied.A pair of parameter was selected asiteration whichis welding current and welding time and used fo
... Show MoreSimplifying formulas that are used for calculations and design are the aim of researchers. For present work, the approach to distinguish the flow under sluice gate was conducted in a laboratory. The extensive experimental program was done to collect fifty-four data points for both free and submerged flow conditions. The data included different discharges, gate openings, flow depths at upstream as well as the flow depths represent a tail water and at a contracted section for downstream. The collected data are analyzed according to a problematic that may encounter in the field, to present a more straightforward (but with acceptable accurate) practical features equations and charts. Based on the proposed formulas, five meth
... Show MoreThe rapid success and the field dilation of Daish organization in both Iraq and Syria make academic institutes and research centers to pay attention to its propaganda means to gain its public opinion, and to further investigation about new methods employed by this organization to disseminate its messages to the public, particularly young people in large areas of the world. This organization uses traditional propaganda techniques on psychological war and its levels, social network sites and platforms that are distributed online. This study seeks to expose more persuasive methods used by the organization to gain multiple classes of society and to disseminate its extremist ideological thoughts. It also studies the psychological operation an
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
God sent the Prophet Muhammad as a teacher and promising harbinger {that is sent to the illiterate messenger reciting to them His signs and purifies them and teaches them the Book and Wisdom} [Friday: 2]; the wisdom of Baos Prophet him peace be and am back to teach people, - Education and therefore his life was very rich educational tactics And has passed the Prophet in different circumstances and conditions that can be experienced by a teacher or educator in any time, anywhere; there is no case of going through the educator or teacher only finds the same or similar or likened to, or close to it in the life of the Prophet peace be upon him Prophet has lived God's peace be upon his strengths and weaknesses, victory and defeat, he lived or
... Show MoreThis study describes how fuzzy logic control FLC can be applied to sonars of mobile robot. The fuzzy logic approach has effects on the navigation of mobile robots in a partially known environment that are used in different industrial and society applications. The fuzzy logic provides a mechanism for combining sensor data from all sonar sensors which present different information. The FLC approach is achieved by means of Fuzzy Decision Making method type of fuzzy logic controller. The proposed controller is responsible for the obstacle avoidance of the mobile robot while traveling through a map from a home point to a goal point. The FLC is built as a subprogram based on the intelligent architecture (IA). The software program uses th
... Show MoreThis paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.
Finally, all algori
... Show MoreThis research is an attempt to develop exercise with weights to strengthen some of the striking muscles in the shoulder and arm and to develop the accuracy of the smash and rectum skills. The importance of this paper lies in the study of moments of force to achieve the ability to control muscular work and to explore the impact of physical and skill exercises with weights to develop moments of force for some muscles. The experimental method on a sample of players, selected according to the intentional method, including ( 9) advanced players representing Air Force Club participating in the Premier League for season 2011-2012. It is concluded that the exercises proposed have their effective impact on developing the variables of moments force f
... Show More