The two parameters of Exponential-Rayleigh distribution were estimated using the maximum likelihood estimation method (MLE) for progressively censoring data. To find estimated values for these two scale parameters using real data for COVID-19 which was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. Then the Chi-square test was utilized to determine if the sample (data) corresponded with the Exponential-Rayleigh distribution (ER). Employing the nonlinear membership function (s-function) to find fuzzy numbers for these parameters estimators. Then utilizing the ranking function transforms the fuzzy numbers into crisp numbers. Finally, using mean square error (MSE) to compare the outcomes of the survival
... Show MoreIn recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThe paper deals with a study of peculiarities of gluttonic text structures in the Arabic-Russian language pair at the sociolinguistic, system structural, functional-stylistic and lexico-semantic aspects from the standpoint of view at functional approach to the phenomena of language systems and the gluttonic discourse as a special type of ver bal and social discourse. Profound attention is paid to the consideration of lexical and grammatical means of explication of glutton discourse on the examples of identi cal Arabic and Russian literary texts as well as language situations in Arab countries and Russia, features of which are due to the characteristics of gluttonic discourses that reflect the features of the two different ethnolingual cu
... Show MoreConditional logistic regression is often used to study the relationship between event outcomes and specific prognostic factors in order to application of logistic regression and utilizing its predictive capabilities into environmental studies. This research seeks to demonstrate a novel approach of implementing conditional logistic regression in environmental research through inference methods predicated on longitudinal data. Thus, statistical analysis of longitudinal data requires methods that can properly take into account the interdependence within-subjects for the response measurements. If this correlation ignored then inferences such as statistical tests and confidence intervals can be invalid largely.
ٳن العلاقة بين التخطيط والتنمية، تكتسب᾽ شكلها وطبيعتها من خلال دور التخطيط في ٳخضاع عملية التغيير والتحوّل للأوضاع الاقتصادية من وضع الى وضع آخر أكثر تقدما̋ عن طريق ٳعتماد منهج التخطيط لتحديد معالم خطوط السير المجدول زمنيا̋ لعملية التغيير والتحوّل وفقا̋ لرؤية الحكومة وفلسفتها باتجاه الانتقال من وضع ٳقتصادي وٳجتماعي متخلف الى وضع ٳقتصادي وٳجتماعي آخر يسمح بجعل عملية النمو مستمرة، ويمكن تبيّن تلك
... Show MoreSingle-input Multiple-output Signals Third-order Active-R Filter for different Circuit Merit Factor Q Configuration is proposed. This paper discusses a new configuration to realize third-order low pass, band pass and high pass. The presented circuit uses Single-input Multiple-output signals, OP-AMP and passive components. This filter is useful for high frequency operation, monolithic IC implementation and it is easy to design .This circuit gives three filter functions low-pass, high-pass and band-pass. This filter circuit can be used for different merit factor (Q) with high pass band gain. This gives better stop-band attenuation and sharper cut-off at the edge of the pass-band. Thus the response shows wider pass-band. The Ideal value of thi
... Show MoreThe formation and structural investigation of three new Mannich bases are reported. The synthesis of these compounds was accomplished via a multicomponent one-pot reaction using CaCl2 as a catalyst. The reaction of the benzaldehyde, m-bromoaniline and cyclohexanone or 4-methylcyclohexanone resulted in the formation of L1 and L3, respectively. The synthesis of L2 was achieved by mixing benzaldehyde, o-bromoaniline and cyclohexanone. The isolated compounds were characterised using a range of analytical and spectroscopic techniques. These include; NMR (1H and 13C-NMR), ESMS, FTIR, electronic spectroscopy, microanalyses and melting points. The NMR data for L1 and L2 indicated the presence of one isomer in solutions, on the NMR time scale. How
... Show MoreThis paper proposed a new method to study functional non-parametric regression data analysis with conditional expectation in the case that the covariates are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables. It utilized the formula of the Nadaraya Watson estimator (K-Nearest Neighbour (KNN)) for prediction with different types of the semi-metrics, (which are based on Second Derivative and Functional Principal Component Analysis (FPCA)) for measureing the closeness between curves. Root Mean Square Errors is used for the implementation of this model which is then compared to the independent response method. R program is used for analysing data. Then, when the cov
... Show MoreObjective This research investigates Breast Cancer real data for Iraqi women, these data are acquired manually from several Iraqi Hospitals of early detection for Breast Cancer. Data mining techniques are used to discover the hidden knowledge, unexpected patterns, and new rules from the dataset, which implies a large number of attributes. Methods Data mining techniques manipulate the redundant or simply irrelevant attributes to discover interesting patterns. However, the dataset is processed via Weka (The Waikato Environment for Knowledge Analysis) platform. The OneR technique is used as a machine learning classifier to evaluate the attribute worthy according to the class value. Results The evaluation is performed using
... Show More