The logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show MoreIn this research, the structural behavior of reinforced concrete columns made of normal and hybrid reactive powder concrete (hybrid by steel and polypropylene fibers) subjected to chloride salts with concentration was 8341.6 mg/l. The study consists of two parts, the first one is experimental study and the second one is theoretical analysis. Three main variables were adopted in the experimental program; concrete type, curing type and loading arrangement. Twenty (120x120x1200) mm columns were cast and tested depending on these variables. The samples were reinforced using two different bars; Ø8 for ties and Ø12 with minimum longitudinal reinforcement (0.01Ag). The specimens were divided into two main groups based o
... Show MoreThis study aimed to evaluate the effectiveness of a novel concrete-encased column (CE) using small circular steel tubes filled with cementitious grouting material (GFST) as the primary reinforcement instead of traditional steel bars. The research involved three different types of reinforcement: conventional steel bars, concrete-filled steel tubes with 30% of the reinforcement ratio of steel bars, and concrete-filled steel tubes with the same reinforcement ratio as steel bars. Twenty-four circular concrete columns were tested and categorized into six groups based on the type of reinforcement employed. Each group comprised four columns, with one subjected to concentric axial load, two subjected to eccentric axial load (with eccentrici
... Show MoreThe current environment is witnessing several developments as a result of the changes taking place in all areas of economic, social , political and legal that led to the transformation of the industrial economy , which depends based on quantitative production to a knowledge economy which relies based on information and knowledge , as the central pillar of this economy during the trading of these information and knowledge between all individuals in general and decision makers , in particular, through information and communication technology of computers and the Internet to achieve sustainable human development in the social dimension. &
... Show MoreThe research aims to demonstrate the impact of governance mechanisms on the quality of financial reports in the light of the accounting disclosure for sustainable development represented in (accounting disclosure for economic development, accounting disclosure for environmental development, and accounting disclosure for social development) in a sample of banks listed in the Iraq Stock Exchange.
Governance mechanisms were measured by evaluating and analyzing the mechanisms in banks for the research sample consisting of (15) banks, based on the governance guide issued by the Central Bank, as well as the banks’ financial reports for the years 2016 -2018, and the dimensions of accounting disclosure for sust
... Show MoreThe importance of regional development resides in the provision of aid and other assistance to regions that are less economically developed. The purpose of this research is to identify the development possibilities and resources at the regional level, which can be tapped for the development of secondary cities. This research aims to shed light on the importance of urban planning in creating regional balance and relieving population and service pressure on major cities. The research answers the question relative to how urban planners can work towards the idea of creating development corridors including the cities located within them, whilst focusing more on the regional dimension and the topic of sustainable urbanization. This research assum
... Show MoreThe research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatements. The researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is
... Show MoreSimultaneous determination of Furosemide, Carbamazepine, Diazepam, and Carvedilol in bulk and pharmaceutical formulation using the partial least squares regression (PLS-1 and PLS-2) is described in this study. The two methods were successfully applied to estimate the four drugs in their quaternary mixture using UV spectral data of 84synthetic mixtures in the range of 200-350nm with the intervals Δλ=0.5nm. The linear concentration range were 1-20 μg.mL-1 for all, with correlation coefficient (R2) and root mean squares error for the calibration (RMSE) for FURO, CARB, DIAZ, and CARV were 0.9996, 0.9998, 0.9997, 0.9997, and 0.1128, 0.1292, 0.1868,0.1562 respectively for PLS-1, and for PLS-2 were 0.9995, 0.9999, 0.9997, 0.9998, and 0.1127, 0.
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5
... Show More