Cox regression model have been used to estimate proportion hazard model for patients with hepatitis disease recorded in Gastrointestinal and Hepatic diseases Hospital in Iraq for (2002 -2005). Data consists of (age, gender, survival time terminal stat). A Kaplan-Meier method has been applied to estimate survival function and hazerd function.
The research draws its importance from identifying the methods of profit management in misleading the financial statements, which in turn is reflected in the decisions of the authorities that relied on these reports, and then the models that help in detecting those methods used by the auditors. Risks. The index (margin of excess cash) was used to detect profit management practices on a group of banks listed in the Iraqi market for securities and the number of (23) banks, including (12) commercial bank and (11) Islamic bank and the results were compared to commercial banks with Islamic banks.((The research started from the hypothesis that the use of the (excess cash margin) model in the banking sector reveals the management
... Show MoreThe propaganda war is one of the most dangerous weapons used in various conditions of war and peace within any intellectual, political or military conflict to be targeted by multiple social groups and their effects on the intellectuals to change the viewpoints at the local and global level, including the use of technical treatment of the audio and visual medium, The impact of the psychological dimensions of the arms in the confrontation and spread terror in the ranks of the enemies and in the forefront of what Iraq faces in its battle against the And the use of it as a propaganda content contributes to the development of the spirit of tranquility and tranquility in the hearts of Iraqis and the return of the right to the owners “th
... Show MoreSemiotics has been through wide experiences in various human sciences, especially in the fields of poetry, novel and myths. But its interest in the theatre and drama was much less and unique despite the richness of the theatrical connection as it is a probable field for the semiotic investigation which may require the semiotic approach in dealing with the theatrical and dramatic show during the two processes of: structural construction and deconstruction starting from a set of overlapping and interconnected texts inside the show, which can be limited in the text, then it would be difficult to semiotically cover all these complex and tricky texts. The theatre in its structural and aesthetic construction is c
... Show MoreGypseous soil, which covers vast area in west, middle, east and south west regions of Iraq exhibit acceptable strength properties when dry, but it is weak and collapsible when it comes in touch with moisture from rain or other sources. When such weak soil is adopted for earth reinforced embankment construction, it may exhibit hazardous situation. Gypseous soil was investigated for the optimum liquid asphalt requirements of both cutback and emulsion using the one-dimensional unconfined compression strength test. The optimum fluid content was 13% (7% of cutback with 6% water content), and 17% (9% of emulsion with 8% water content). A laboratory model box of 50x50x25 cm was used as a representative of embankment; soil or asphalt stabilize
... Show MoreDepartments and offices of public relations and media in any institution or company is the most important departments that reflect the results of their work negatively or positively on their reputation. This goes beyond the trust and credibility that its internal and external audiences will give it. Where such matter requires the staff, working in these departments and offices, to have communication skills that qualify them to do the role of marketing the communication message. Yet, the communication skills of public relations and media staff vary from person to person depending on the communication position. This skill has two criteria: Achieving the communication goal and the speed in achieving it as a number of skills
... Show MoreDuring COVID-19, wearing a mask was globally mandated in various workplaces, departments, and offices. New deep learning convolutional neural network (CNN) based classifications were proposed to increase the validation accuracy of face mask detection. This work introduces a face mask model that is able to recognize whether a person is wearing mask or not. The proposed model has two stages to detect and recognize the face mask; at the first stage, the Haar cascade detector is used to detect the face, while at the second stage, the proposed CNN model is used as a classification model that is built from scratch. The experiment was applied on masked faces (MAFA) dataset with images of 160x160 pixels size and RGB color. The model achieve
... Show MoreThis study seeks to shed light on the aspects of visual pollution and its impact on the aesthetics of the town of Al-Eizariya known to suffer from the phenomenon. In order to identify the real causes of the problem which develops in various forms and patterns, threatening not only the aesthetic appearance of the towns, but also causes the emergence of new problems and phenomena that will have negative repercussions on the population. The researcher uses the analytical descriptive method to analyze the phenomenon of visual pollution in terms of reality, development, manifestations and spread and uses photos which document the visual pollution and its impact on the aesthetics of the known. The study concluded the existence of a strong rela
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More