In multivariate survival analysis, estimating the multivariate distribution functions and then measuring the association between survival times are of great interest. Copula functions, such as Archimedean Copulas, are commonly used to estimate the unknown bivariate distributions based on known marginal functions. In this paper the feasibility of using the idea of local dependence to identify the most efficient copula model, which is used to construct a bivariate Weibull distribution for bivariate Survival times, among some Archimedean copulas is explored. Furthermore, to evaluate the efficiency of the proposed procedure, a simulation study is implemented. It is shown that this approach is useful for practical situations and applicable for real datasets. Moreover, when the proposed procedure implemented on Diabetic Retinopathy Study (DRS) data, it is found that treated eyes have greater chance for non-blindness compared to untreated eyes.
With the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se
... Show MorePublic budget is the government's tool in achieving the objectives of economic and social development is the accounting curriculum to estimate state revenues and expenditures for years to come, as well as to have legal status as it is after the adoption of an official statement of government units to spend funds on items planned at the same time is a statement collect resources to finance these appropriations, if the primary objective of the budget initially limited to the achievement of financial and legislative control have evolved this function in the area of public administration turned attention from mere imposition of control over the money, which provides information to assist the Department to utilize available resources and prog
... Show MoreГоды, принадлежащие концу XIX – началу XX столетия, вошли в русскую литературу под красивым названием Серебряный век. В это время в стране появился целый ряд выдающихся поэтов, имена которых навсегда останутся в русской и мировой литературе. Это Ахматова, Гумилев, Блок, Маяковский и многие другие. Все эти люди творили в нелегкое для России время. Началом Серебряного века условно считают 189
... Show Moreسعي المجتمع العراقي منذ أكثر من نصف قرن مضى لإعادة استثمار عشرات المليارات من الدولارات من الإيرادات النفطية في القطاع الزراعي وهياكله وبنياته التحية، كإنشاء السدود والخزانات المائية واستصلاح الأراضي والمشاريع الإنتاجية الحيوانية والنباتية وبطاقات كادت تقترب او تتجاوز حاجز طلب السكان من الأغذية والمنتوجات الزراعية التي تغذي الصناعة الا ان الزيادة السكانية وتحسن مستوى الدخل النفطي شكلا انتقالا جدي
... Show Moreتتزايد الصعوبات التي يعاني منها الطالب بشكل خاص والتدريسي بشكل عام في المرحلة الراهنة وذلك لنقص المصادر والكوادر العلمية الرصينة التي كانت تفخر بها جامعات العراق ولا سيما جامعة بغداد اذ أن الجامعات هي اعلى قيمة في السلم التعليمي وتعد بيئة نقية أوجدها المجتمع للتربية من خلال المناهج الدراسية التي تؤدي بشكل سليم وان الجامعة بوصفها سياقاً اجتماعياً لها أهمية في التشجيع على الإبداع وتعد جيلاً من الشباب للعمل
... Show MoreThe study aims to provide a Suggested model for the application of Virtual Private Network is a tool that used to protect the transmitted data through the Web-based information system, and the research included using case study methodology in order to collect the data about the research area ( Al-Rasheed Bank) by using Visio to design and draw the diagrams of the suggested models and adopting the data that have been collected by the interviews with the bank's employees, and the research used the modulation of data in order to find solutions for the research's problem.
The importance of the study Lies in dealing with one of the vital topics at the moment, namely, how to make the information transmitted via
... Show MoreAbstract
Much attention has been paid for the use of robot arm in various applications. Therefore, the optimal path finding has a significant role to upgrade and guide the arm movement. The essential function of path planning is to create a path that satisfies the aims of motion including, averting obstacles collision, reducing time interval, decreasing the path traveling cost and satisfying the kinematics constraints. In this paper, the free Cartesian space map of 2-DOF arm is constructed to attain the joints variable at each point without collision. The D*algorithm and Euclidean distance are applied to obtain the exact and estimated distances to the goal respectively. The modified Particle Swarm Optimization al
... Show MoreThis paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More