In this research, a factorial experiment (4*4) was studied, applied in a completely random block design, with a size of observations, where the design of experiments is used to study the effect of transactions on experimental units and thus obtain data representing experiment observations that The difference in the application of these transactions under different environmental and experimental conditions It causes noise that affects the observation value and thus an increase in the mean square error of the experiment, and to reduce this noise, multiple wavelet reduction was used as a filter for the observations by suggesting an improved threshold that takes into account the different transformation levels based on the logarithm of the base and obtaining several values for the suggested threshold and applying then Haar wavelet function With the cut-off hard and mid threshold and Comparing the results according to several criteria.
The aim of this study is to estimate the parameters and reliability function for kumaraswamy distribution of this two positive parameter (a,b > 0), which is a continuous probability that has many characterstics with the beta distribution with extra advantages.
The shape of the function for this distribution and the most important characterstics are explained and estimated the two parameter (a,b) and the reliability function for this distribution by using the maximum likelihood method (MLE) and Bayes methods. simulation experiments are conducts to explain the behaviour of the estimation methods for different sizes depending on the mean squared error criterion the results show that the Bayes is bet
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreBackground: Antimicrobial prescribing patterns have an important role in the emergence of resistance, and community pharmacists have a substantial influence on this issue. Objective: To assess community pharmacists' behaviors and attitudes toward antimicrobial dispensing, determine their proportions and categories, and examine the underlying rationales for this practice. Methods: A descriptive cross-sectional survey of community pharmacists in Iraq was conducted from June to August 2023, using a self-administered validated questionnaire. The attitudes, practices, and motivations driving the distribution of antimicrobials without a prescription (AWP) were explored in three areas. Results: A sizable proportion (61.6%) of respondents rejected
... Show MoreIn this work, the possibility to use new suggested carriers (D= Aspirin, Ibuprofen, Paracetamol, Tramal) is discussed for diclofenac drug (voltarine) by using quantum mechanics calculations. The calculation methods (PM3) and (DFT) have been used for determination the reaction path of (O-D) bond rupture energies. Different groups of drugs as a carrier for diclofenac prodrugs (in a vacuum) have been used; at their optimized geometries. The calculations included the geometrical structure and some of the physical properties, in addition to the toxicity, biological activity, and NLO properties of the prodrugs, investigated using HF method. The calculations were done by Gaussian 09 program. The comparison was made for total energies of reactan
... Show MoreThe impact of a proposal for the curriculum dictated by some of the barriers to the development of motor skillsA. M. D. Huda Ibrahim RezoukiM. M. Susan Salim DawoodIs the childhood of the most important and most fertile stage of basic education because of their significant impact in building a base on which the stated origin of sound in the early stages older age because the baby at this stage be very vulnerability to environmental factors different surroundings in which to leave their mark on his life in the stages of life other.The Gymnastics of sports long-term training, which begins between the ages very early relative to the rest of other games to reach the stage of the tournament from the age of 13-17 years almost to the women, this a
... Show MoreRecently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch
... Show More