Due to the lack of statistical researches in studying with existing (p) of Exogenous Input variables, and there contributed in time series phenomenon as a cause, yielding (q) of Output variables as a result in time series field, to form conceptual idea similar to the Classical Linear Regression that studies the relationship between dependent variable with explanatory variables. So highlight the importance of providing such research to a full analysis of this kind of phenomena important in consumer price inflation in Iraq. Were taken several variables influence and with a direct connection to the phenomenon and analyzed after treating the problem of outliers existence in the observations by (EM) approach, and expand the sample size (n=36) to
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show MoreThe present study aims to identify wisdom-based thinking and its relationship to psychological capital. It further aims to find out the differences in the level of wisdom-based thinking and psychological capital according to the variables of gender and specialization (scientific, humanities). To achieve this, the study has been conducted on a sample of (380) male and female students. The two scales, wisdom-based thinking and psychological capital are implemented to the sample after being constructed by the researcher and after ensuring their psychometric characteristics' suitability for the study's aims. Results concerning the first aim have shown that there is a significant relationship among students. The second aim has revealed that t
... Show MoreThis study aims to know the relationship between the birth order and lifestyles among a sample of adolescent students. The sample of the study consisted of (200) students selected from the governmental schools in the Directorate of Education of Qabatiya, in the second semester of the academic year 2020/2021. The results of the study have revealed that the most common lifestyles among the sample of the study are represented by: (the belonging) style, (the submissive) style, (the avenger) style, (the pampered) style, respectively. The study has also found that there are statistically significant differences in the lifestyles of: (the victim, the domineering, the avenger, and the harmful) which are ascribed to the gender variable. Mor
... Show MoreBackground: Acute appendicitis is a common surgical
problem that is associated with an acute-phase reaction.
Previous studies have shown that cytokines and acutephase proteins are activated and may serve as indicators for
appendicitis.
Objective: The aim of this study was to evaluate of serum
levels of interleukin-6 (IL-6) in correlation to the severity
to acute appendicitis.
Methods: This is a prospective study from December 2008
to March 2009 of patients who had appendectomy in
Department of Surgery, Al-Kindy Teaching Hospital -
Baghdad/Iraq. Serum for estimating levels of interleukin-6
(IL-6) was taken pre-operatively. Depending on the
macroscopic evidence during the operation and the
histopathol
This paper proposes a new algorithm (F2SE) and algorithm (Alg(n – 1)) for solving the
two-machine flow shop problem with the objective of minimizing total earliness. This
complexity result leads us to use an enumeration solution approach for the algorithm (F2SE)
and (DM) is more effective than algorithm Alg( n – 1) to obtain approximate solution.
Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu
... Show MoreEstimation of the names and verbs of some letters to consider the grammatical industry