This research aims to study the important of the effect of analysis of covariance manner for one of important of design for multifactor experiments, which called split-blocks experiments design (SBED) to deal the problem of extended measurements for a covariate variable or independent variable (X) with data of response variable or dependent variable Y in agricultural experiments that contribute to mislead the result when analyze data of Y only. Although analysis of covariance with discussed in experiments with common deign, but it is not found information that it is discussed with split-Blocks experiments design (SBED) to get rid of the impact a covariance variable. As part application actual field experiment conducted, begun at
... Show MoreThis study aims to identify the degree of students of Princess Rahma University College owning e-learning skills related to MOODLE as they perceived in the of light Corona crisis. The researchers' questionnaire consisted of (37) items, distributed in three areas of e-learning skills related to the MOODLE on (147) students were chosen randomly. The results of the study showed that the degree of students 'possession of e-learning skills related to the MOODLE was significant. The results also revealed that there were statistically significant differences in the degree of students' possession of electronic learning skills related to the MOODLE due to sex in favor of females. Finally, there were no statistically significant differences in the
... Show MoreThis research presents a particular designing strategy for a free form of surfaces, constructed by the lofting design method. The regarded surfaces were created by sliding a B-spline curves (profile curves), in addition to describing an automatic procedure for selective identification of sampling points in reverse engineering applications using Coordinate Measurement Machine. Two models have been implemented from (Ureol material) to represent the different cases of B-spline types to clarify its scope of application. The interior data of the desired surfaces was designed by MATLAB software, which then were transformed to UG-NX9 software for connecting the sections that were designed in MATLAB program and obtaining G-code programs for the
... Show MoreIn this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those
... Show MoreThe development of information systems in recent years has contributed to various methods of gathering information to evaluate IS performance. The most common approach used to collect information is called the survey system. This method, however, suffers one major drawback. The decision makers consume considerable time to transform data from survey sheets to analytical programs. As such, this paper proposes a method called ‘survey algorithm based on R programming language’ or SABR, for data transformation from the survey sheets inside R environments by treating the arrangement of data as a relational format. R and Relational data format provide excellent opportunity to manage and analyse the accumulated data. Moreover, a survey syste
... Show MoreA finite element is a study that is capable of predicting crack initiation and simulating crack propagation of human bone. The material model is implemented in MATLAB finite element package, which allows extension to any geometry and any load configuration. The fracture mechanics parameters for transverse and longitudinal crack propagation in human bone are analyzed. A fracture toughness as well as stress and strain contour are generated and thoroughly evaluated. Discussion is given on how this knowledge needs to be extended to allow prediction of whole bone fracture from external loading to aid the design of protective systems.
In this research, we dealt with the study of the Non-Homogeneous Poisson process, which is one of the most important statistical issues that have a role in scientific development as it is related to accidents that occur in reality, which are modeled according to Poisson’s operations, because the occurrence of this accident is related to time, whether with the change of time or its stability. In our research, this clarifies the Non-Homogeneous hemispheric process and the use of one of these models of processes, which is an exponentiated - Weibull model that contains three parameters (α, β, σ) as a function to estimate the time rate of occurrence of earthquakes in Erbil Governorate, as the governorate is adjacent to two countr
... Show Moreطريقة مقترحة لانشاء تصاميم القطاعات غير الكاملة المتزنة BIBD بتوظيف الخوارزمية الجينية الوراثية
Abstract:
This study is studied one method of estimation and testing parameters mediating variables in a structural equations model SEM is causal steps method, in order to identify and know the variables that have indirect effects by estimating and testing mediation variables parameters by the above way and then applied to Iraq Women Integrated Social and Health Survey (I-WISH) for year 2011 from the Ministry of planning - Central statistical organization to identify if the variables having the effect of mediation in the model by the step causal methods by using AMOS program V.23, it was the independent variable X represents a phenomenon studied (cultural case of the
This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show More