يسعى المجتمع من خلال الوحدات الإقتصادية إلى الوصول إلى تحقيق أفضل الإنجازات التي لا تتمثل بالسلع والخدمات حسب وإنما بما يتحقق من مردود لكافة الاطراف المعنية بالوحدات الإقتصادية على ان لايتم ذلك على حساب قيم المجتمع وأخلاقياته وآدابه العامة. وعليه تصبح الوحدات الإقتصادية مسرحاً لصراعات قوى متعددة كل منها له قيمه الأخلاقية سواء كان فرداً أومجموعة افراد أو وحدة إقتصادية أو أي جهة أُخرى، وبحكم مسؤولياته
... Show MoreThe idea of carrying out research on incomplete data came from the circumstances of our dear country and the horrors of war, which resulted in the missing of many important data and in all aspects of economic, natural, health, scientific life, etc.,. The reasons for the missing are different, including what is outside the will of the concerned or be the will of the concerned, which is planned for that because of the cost or risk or because of the lack of possibilities for inspection. The missing data in this study were processed using Principal Component Analysis and self-organizing map methods using simulation. The variables of child health and variables affecting children's health were taken into account: breastfeed
... Show MoreA liquid-solid chromatography of Bovine Serum Albumin (BSA) on (diethylaminoethyl-cellulose) DEAE-cellulose adsorbent is worked experimentally, to study the effect of changing the influent concentration of (0.125, 0.25, 0.5, and 1 mg/ml) at constant volumetric flow rate Q=1ml/min. And the effect of changing the volumetric flow rate (1, 3, 5, and 10 ml/min) at constant influent concentration of Co=0.125mg/ml. By using a glass column of (1.5cm) I.D and (50cm) length, packed with adsorbent of DEAE-cellulose of height (7cm). The influent is introduced in to the column using peristaltic pump and the effluent concentration is investigated using UV-spectrophotometer at 30oC and 280nm wavelength. A spread (steeper) break-through curve is gained
... Show MoreComputer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t
... Show MoreIn this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint
... Show MoreAn encryption system needs unpredictability and randomness property to maintain information security during transmission and storage. Although chaotic maps have this property, they have limitations such as low Lyapunov exponents, low sensitivity and limited chaotic regions. The paper presents a new improved skewed tent map to address these problems. The improved skew tent map (ISTM) increases the sensitivity to initial conditions and control parameters. It has uniform distribution of output sequences. The programs for ISTM chaotic behavior were implemented in MATLAB R2023b. The novel ISTM produces a binary sequence, with high degree of complexity and good randomness properties. The performance of the ISTM generator shows effective s
... Show MoreThe substantial key to initiate an explicit statistical formula for a physically specified continua is to consider a derivative expression, in order to identify the definitive configuration of the continua itself. Moreover, this statistical formula is to reflect the whole distribution of the formula of which the considered continua is the most likely to be dependent. However, a somewhat mathematically and physically tedious path to arrive at the required statistical formula is needed. The procedure in the present research is to establish, modify, and implement an optimized amalgamation between Airy stress function for elastically-deformed media and the multi-canonical joint probability density functions for multivariate distribution complet
... Show MoreBackground: e cerebellum is divided into two hemispheres and contains a narrow midline zone called thevermis. A set of large folds are conventionally used to divide the overall structure into ten smaller "lobules". evermis receives fibres from the trunk and proximal portions of limbs, But the question is that does the cerebellum have the same measurementvalues in males and females of the same age?Material and method: e present study used 80 sectional brain MRI images (40: males, 40: females); 35-50 years old as indices of size for thevermian structures of the Cerebellum. is middle age group was taken because as known generally it could be neither an age of growth as inthe young nor of atrophy as in old individuals. e aim rega
... Show MoreThe logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables. The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.
... Show More