Regression Discontinuity (RD) means a study that exposes a definite group to the effect of a treatment. The uniqueness of this design lies in classifying the study population into two groups based on a specific threshold limit or regression point, and this point is determined in advance according to the terms of the study and its requirements. Thus , thinking was focused on finding a solution to the issue of workers retirement and trying to propose a scenario to attract the idea of granting an end-of-service reward to fill the gap ( discontinuity point) if it had not been granted. The regression discontinuity method has been used to study and to estimate the effect of the end -service reward on the cutoff of insured workers as well as the increase in revenues resulting from that. The research has showed that this reward has a clear effect on increasing revenues due to the regularity of workers in their work and their work continuity . It has also found that using Local Linear Smother (LLS) by using three models of bandwidth selection. Its results after the analysis in the Regression program have been as follows: The CCT (Calonico, Cattaneo & Titiunik) beamwidth gives the best performance followed by the local linear regression using the LK (Lembens and kalyanman) beamwidth. The real data has been used in sample size 71 represented in compensation as a variable of effectiveness (illustrative) X and the revenue as a result or an approved variable Y, while the results of the traditional OLS estimation method have not been good enough.
Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD
... Show MoreDelivering therapeutic agents to the brain remains a major challenge due to the restrictive nature of the blood–brain barrier (BBB). Intranasal administration has emerged as a promising, non-invasive approach that bypasses the BBB and facilitates direct nose-to-brain transport via the olfactory and trigeminal pathways. In this study, we developed a nanostructured lipid carrier (NLC) system for the intranasal delivery of dolutegravir sodium, a potent integrase inhibitor, with the goal of enhancing brain bioavailability for the treatment of neuroHIV and related central nervous system (CNS) complications. The NLCs were optimized for particle size, polydispersity index (PDI), and drug incorporation efficiency. The optimized formulation exhibi
... Show MoreThe new of compounds synthesized by sequence reactions starting from a reaction of 3-phenylenediamine or 4-phenylenediamine with chloroacetyl chloride to produce the compounds [I]a,b, then the compounds[I]a,b reacted with sodium azide to yield compounds[II]a,b that reacted 1,3-dipolarcycloaddition reaction with acrylic acid to give compounds [III]a,b these compounds reacted with methanol led to ester compounds[IV]a,b then reacted with hydrazine to give acid hydrazide [V]a,b . Finally compounds [V]a,b reacted with aromatic aldehydes to product shiff bases derivatives. The compounds characterized by mp. , IR, 1HNMR in addition to mass spectroscopy for some of them the liquid crystals properties were studied by using polarized optical microsco
... Show MoreThe present work provides a list of all amphibians and reptiles recorded from Iraq up to 2014. It includes 115 species (105 species of reptiles and 10 species of amphibians) dating back to 25 families (20 families of reptiles and 5 families of amphibians). Conservation status of each species was mentioned.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreThe rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in
... Show More