The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree model. Having been in this research compare these methods form a model for additive function to some nonparametric function. It was a trade-off between these process models based on the classification accuracy by misclassification error, and estimation accuracy by the root of the mean squares error: RMSE. It was the application on patients with diabetes data for those aged 15 years and below are taken from the sample size (200) was withdrawn from the Children Hospital in Al-Eskan / Baghdad.
For a mathematical model the local bifurcation like pitchfork, transcritical and saddle node occurrence condition is defined in this paper. With the existing of toxicity and harvesting in predator and prey it consist of stage-structured. Near the positive equilibrium point of mathematical model on the Hopf bifurcation with particular emphasis it established. Near the equilibrium point E0 the transcritical bifurcation occurs it is described with analysis. And it shown that at equilibrium points E1 and E2 happened the occurrence of saddle-node bifurcation. At each point the pitch fork bifurcation occurrence is not happened.
Praise be to God, who is satisfied with Islam as our religion, “He opened a clear conquest for us,” and whoever works with us through the Shari’ah works and protects us. And that our master and Mawlana Muhammad His servant and Messenger is a prophet who has been merciful and compassionate. "
And after:
The occupation of Iraq and the accompanying bone events, and the following severe obstacles, resulted in a set of problems that require legitimate stances, and satisfactory answers, remove confusion and delusion, amid the clash of opinions and contradictions of jurisprudence. Work and application.
Among the difficult problems that surfaced in light of the new political developments on the land of Iraq: (the ruling on dealing
Codes of red, green, and blue data (RGB) extracted from a lab-fabricated colorimeter device were used to build a proposed classifier with the objective of classifying colors of objects based on defined categories of fundamental colors. Primary, secondary, and tertiary colors namely red, green, orange, yellow, pink, purple, blue, brown, grey, white, and black, were employed in machine learning (ML) by applying an artificial neural network (ANN) algorithm using Python. The classifier, which was based on the ANN algorithm, required a definition of the mentioned eleven colors in the form of RGB codes in order to acquire the capability of classification. The software's capacity to forecast the color of the code that belongs to an object under de
... Show MoreFace recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe spread of novel coronavirus disease (COVID-19) has resulted in chaos around the globe. The infected cases are still increasing, with many countries still showing a trend of growing daily cases. To forecast the trend of active cases, a mathematical model, namely the SIR model was used, to visualize the spread of COVID-19. For this article, the forecast of the spread of the virus in Malaysia has been made, assuming that all Malaysian will eventually be susceptible. With no vaccine and antiviral drug currently developed, the visualization of how the peak of infection (namely flattening the curve) can be reduced to minimize the effect of COVID-19 disease. For Malaysians, let’s ensure to follow the rules and obey the SOP to lower the
Abstract
This study aims to identify the degree to which the first cycle teachers use different feedback patterns in the E-learning system, to identify the differences in the degree of use according to specialization, teaching experience, and in-service training in the field of classroom assessment as well as the interaction between them. The study sample consisted of (350) female teachers of the first cycle in the governmental schools in Muscat Governorate for the academic year 2020/2021. The study used a questionnaire containing four different feedback patterns: reinforcement, informative, corrective, and interpretive feedback. The psychometric properties of the questionnaire were verified in terms of validity
... Show MoreThis study was conducted to determine the ability of water treatment system (Vortisand) to reduce some chemical and physical properties for tigris river raw water, It consisted of turbidity, electrical conductivity, pH, total hardness, calcium Hardness as well as temperature in order to determine the unit`s efficiency for reducing their concentration as compared to those in the water produced by some classical potable water projects (Dora and Wathba) in Baghdad. Samples were collected during the cold months (December 2016 and January 2017) and during the hot months (May and June 2017). The results showed that this system has the ability to reduce some properties such as turbidity, the values were 215NTU in raw water and decreased to NTU
... Show MoreResearch Objectives: The research aims to highlight the approach of Imam Al-Qaradawi in contemporary jurisprudence in the recent issues of the jurisprudence of minorities, and mentioning the foundations of jurisprudence of minorities, along with some of the practical applications of Imam Al-Qaradawi.
Study Methodology: The researcher applied the inductive, analytical and comparative approach by tracking the scientific material related to the subject of the study from the books of Al-Qaradawi in the first place, then by comparing the legal provisions with what had been stated in the four schools of jurisprudence.
Findings: The interest and need of Muslim minorities in non-
... Show More