In this research we been estimated the survival function for data suffer from the disturbances and confusion of Iraq Household Socio-Economic Survey: IHSES II 2012 , to data from a five-year age groups follow the distribution of the Generalized Gamma: GG. It had been used two methods for the purposes of estimating and fitting which is the way the Principle of Maximizing Entropy: POME, and method of booting to nonparametric smoothing function for Kernel, to overcome the mathematical problems plaguing integrals contained in this distribution in particular of the integration of the incomplete gamma function, along with the use of traditional way in which is the Maximum Likelihood: ML. Where the comparison on the basis of the method of the Central Bureau of Statistics to stay through the program MORTPAK real function values calculated. And then compared to the use of Root Mean Square Error: RMSE, and Mean Absolute Percent Error: MAPE. The results showed preference entropy as optimal method to estimate survival function on other methods.
دُرِست العوامل المؤثرة في عدد ساعات تجهيز الكهرباء في مدينة بغداد، وتكونت عينة الدراسة من (365) مشاهدة يومية لعام 2018، وتمثلت بستة متغيرات استعملت في الدراسة. كان الهدف الرئيس هو دراسة العلاقة بين هذه المتغيرات، وتقدير تأثيرات المتغيرات التنبؤية في المتغير التابع (عدد ساعات تجهيز الكهرباء في مدينة بغداد). ولتحقيق ذلك استعملت نمذجة المعادلات الهيكلية/ تحليل المسار وبرنامج AMOS
... Show MoreThe Islamic Issue did not rise the “widespread arguments” in contemporary times, just as the issue of applying Islamic Law. Just as the Islamic forces used this purpose, or employed it during their march to reach to power by adopting the sacred as motivation towered the power, or control the governance. However, the reality show that this goal remained within the boundaries of slogans in the sense of a teleological slogan, and did not go beyond the limits of advocacy or arrangement as the primary source of legislation with differences of teleological reasoning, in a manner that reflected an intellectual problem about the validity of the use of this concept or the ability to apply and enforce the law in today's world, to impose
... Show Morethe power of the federal supreme court to stop the implementation of the law
The research aims to identify the level of educational supervisors' practices of their supervisory duties according to the requirements of comprehensive quality from the viewpoint of teachers in Oman. Moreover, identify the differences between the responses of the sample about these practices, which are attributed to gender, and years of experience. Thus, a questionnaire was administered to teachers, consisting of (48) items distributed on (5) main fields related to the educational supervisor's practices. The sample consisted of (220) teachers who were randomly chosen from the schools in Dhofar region. Data were analyzed using means, standard divisions, T-test, and One Way ANOVA. The research concluded that the level of educational super
... Show MoreThis purpose of the research is to test liquidity ratios to assess bank liquidity risks represented by liquidity ratios (current assets / current liabilities, current assets / total deposits, current assets / total assets, cash credit / total deposits, liquidity coverage ratio LCR, net stable financing ratio NSFR). This research involves evaluating these risks in banks via these ratios, and reveal the most important means used to solve these risks, including the capital adequacy ratio under the Basel II decisions and for selected period (2017-2019).The research reached the most important conclusion, which is the bank sample did not fall into bank liquidity risks throughout the years of research. Tracking specific ratio with adequ
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreThe solution to the problems and challenges of the twenty-first century requires the absorption of many transformations, such as demographic change, poverty reduction, the expansion of safe and clean energy without affecting the environment, as well as reducing health risks and other transitions. It also requires greater cooperation than is possible in the current global system, because both of these constraints and challenges, even if addressed locally or nationally, are because of the potential for their transnational impact, that is, their impact on the lives of people at the global level, Which is necessary to be fully addressed unless it is guided by a comprehensive global vision. This is what environmental governance provides in te
... Show MoreThis study aims to identify how the Zakat Fund contributes to financing entrepreneurial projects; and the role that these projects play in achieving economic and social development, despite the importance that contracting projects have in most countries as the main engine of growth; however, they still face many challenges that In the forefront of which is the challenge of obtaining financing; in this regard, it is possible to resort to the use of Zakat funds in the Islamic economy as it is a funding source that is closely proportional to the characteristics and goals of entrepreneurial projects in achieving development;
 
... Show MoreAbstract
The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.
... Show More
Abstract:
The study focused on the application of smart tourism as one of the applications of electronic commerce in the form of (B2C) to attract tourists to Saudi Arabia, where the tourism sector is one of the important sectors on which the Kingdom depends on the diversity of its economy.
The purpose of the research: With the issuance of tourist visas for the first time the study noted a deterioration in the case of Saudi tourist sites over the Internet, which do not live up to this great interest by the Saudi government for this sector, which became vital to them. The study tried to identify the reality of the Saudi tourist sites through the Internet in order to identify the sui
... Show More