COVID-19 is a disease that has abnormal over 170 nations worldwide. The number of infected people (either sick or dead) has been growing at a worrying ratio in virtually all the affected countries. Forecasting procedures can be instructed so helping in scheming well plans and in captivating creative conclusions. These procedures measure the conditions of the previous thus allowing well forecasts around the state to arise in the future. These predictions strength helps to make contradiction of likely pressures and significances. Forecasting procedures production a very main character in elastic precise predictions. In this case study used two models in order to diagnose optimal approach by compared the outputs. This study was introduce
... Show MoreThe forensic evidence important for the sources of legislation after the book of God Almighty and the Sunnah of the purified, including what is agreed upon in the protest, which is the book and the Sunnah and consensus, and what is different in the protest, such as measurement and approval and say companions and interests sent, and that the approval of the evidence that did not agree Accordingly, the terms of the fundamentalists differed and their definition differed with the similarity between each other, and the approval in some schools is an argument is not considered as the Shaafa'is, so it may correspond to measurement with them, but the approval at the tap and those who agree is a hidden measurement is likely to clear measurement,I
... Show MoreThe purpose of this research is to a treatment the impact of Views outliers to the estimators of a distributed arrival and service to the theory of queues and estimate the distribution parameters depending on the robust estimators, and when he was outliers greatest impact in the process of estimating the both distributions mentioned parameters, it was necessary to use way to test that does these data contain abnormal values or not? it was used the method ( Tukey ) for this purpose and is of the most popular ways to discover the outliers , it shows that there are views abnormal (outliers ) in the estimators of each of the distributional arrival and service, which have a significant impact on the calculation of these estimato
... Show MoreTitanium alloys are broadly used in the medical and aerospace sectors. However, they are categorized within the hard-to-machine alloys ascribed to their higher chemical reactivity and lower thermal conductivity. This aim of this research was to study the impact of the dry-end-milling process with an uncoated tool on the produced surface roughness of Ti6Al4V alloy. This research aims to study the impact of the dry-end milling process with an uncoated tool on the produced surface roughness of Ti6Al4V alloy. Also, it seeks to develop a new hybrid neural model based on the training back propagation neural network (BPNN) with swarm optimization-gravitation search hybrid algorithms (PSO-GS
Abstract
Multivariate GARCH Models take several forms , the most important DCC dynamic conditional correlation, and CCC constant conditional correlation , The Purpose of this research is the Comparison for both Models.Using three financial time series which is a series of daily Iraqi dinar exchange rate indollar, Global daily Oil price in dollar and Global daily gold price in dollarfor the period from 01/01/2014 till 01/01/2016, Where it has been transferred to the three time series returns to get the Stationarity, some tests were conducted including Ljung-Box , JarqueBera , Multivariate ARCH to Returns Series and Residuals Series for both models In Comparison
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More