The use of Bayesian approach has the promise of features indicative of regression analysis model classification tree to take advantage of the above information by, and ensemble trees for explanatory variables are all together and at every stage on the other. In addition to obtaining the subsequent information at each node in the construction of these classification tree. Although bayesian estimates is generally accurate, but it seems that the logistic model is still a good competitor in the field of binary responses through its flexibility and mathematical representation. So is the use of three research methods data processing is carried out, namely: logistic model, and model classification regression tree, and bayesian regression tree model. Having been in this research compare these methods form a model for additive function to some nonparametric function. It was a trade-off between these process models based on the classification accuracy by misclassification error, and estimation accuracy by the root of the mean squares error: RMSE. It was the application on patients with diabetes data for those aged 15 years and below are taken from the sample size (200) was withdrawn from the Children Hospital in Al-Eskan / Baghdad.
With today's rapid and full of dangers the world banking sector is one of the most vital sectors at risk, and on the supervisory bodies responsible for monitoring the work of banks to take an active role in influencing the banks and put on the right track and is compatible with internationally approved curriculum. The lie of the research problem in the weak supervisory role of the Central Bank for banks in general and private banks in particular, limited the process of performance audit carried out by the Federal Office of Financial Supervision in auditing oversight role of the Central Bank control over the banks, according to the methods of performance audit followed by the upper bodies of financial control and accounting, And it was ba
... Show MoreThe study aimed to examine the impact of audit committee characteristics on the practices of intellectual capital disclosure in the annual reports of Bank and Insurance companies listed on Palestine Exchange, through performing content analysis of the annual reports for the study sample which totaled thirteen companies, including six banks and seven insurance companies. To achieve the study objectives, the study employed a content analysis approach in order to analyze the content of the intellectual capital disclosure practice, in addition, the study used cross-sectional with longitudinal data for time series for a period of time between 2014-2019. The empirical results indicated that financial expertise and the number of meeting
... Show MoreThe theme of love has been and still is the interest of authors and writers for it is closely related to people’s lives. That great passion has helped them express genuine thoughts pertinent to that theme that has given rise to many debates, some are vague and others controversial. In his (strait is the gate), (La Porte étroite), André Gide has sought to shed light on his characters perspective of love and its relationship with sacredness and divine happiness. Indeed these characters have found often themselves restrained, chained and exhausted, by tough religious commands that have imposed on them spiritual commitments and duties too hard to break.
André Gide has revealed a protestant deviation from the perfection theme tha
... Show MoreDistributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks
... Show MoreIn this paper, the dynamics of scavenger species predation of both susceptible and infected prey at different rates with prey refuge is mathematically proposed and studied. It is supposed that the disease was spread by direct contact between susceptible prey with infected prey described by Holling type-II infection function. The existence, uniqueness, and boundedness of the solution are investigated. The stability constraints of all equilibrium points are determined. In addition to establishing some sufficient conditions for global stability of them by using suitable Lyapunov functions. Finally, these theoretical results are shown and verified with numerical simulations.
This paper aims to validate a proposed finite element model to be adopted in predicting displacement and soil stresses of a piled-raft foundation. The proposed model adopts the solid element to simulate the raft, piles, and soil mass. An explicit integration scheme has been used to simulate nonlinear static aspects of the piled-raft foundation and to avoid the computational difficulties associated with the implicit finite element analysis.
The validation process is based on comparing the results of the proposed finite element model with those of a scaled-down experimental work achieved by other researchers. Centrifuge apparatus has been used in the experimental work to generate the required stresses to simulate t
... Show MoreIn this paper we present the first ever measured experimental electron momentum density of Cu2Sb at an intermediate resolution (0.6 a.u.) using 59.54 keV 241Am Compton spectrometer. The measurements are compared with the theoretical Compton profiles using density function theory (DFT) within a linear combination of an atomic orbitals (LCAO) method. In DFT calculation, Perdew-Burke-Ernzerhof (PBE) scheme is employed to treat correlation whereas exchange is included by following the Becke scheme. It is seen that various approximations within LCAO-DFT show relatively better agreement with the experimental Compton data. Ionic model calculations for a number of configurations (Cu+x/2)2(Sb-x) (0.0≤x≤2.0) are also performed utilizing free a
... Show MoreThis study presents the results of atmospheric particulates sampling using high volume air sampler for selected places at Al Tuwaitha nuclear site. The collected samples were analyzed for gross alpha /beta radioactivity using Ludlum model 3030 and measurement particles activity in Al Tuwaitha nuclear site and the surrounding areas for the period from 28/12/2016 to 13/4/2017.The measurement of activity concentrations ranged from (0.42±0.03 to 4.18±0.13) Bq/m3 for alpha particles and from(0.93±0.06 to 9.21±0.26) Bq/m3for beta particles. The activity concentration of nuclides inversely proportional with air temperature and wind speed while humidity is directly proportional with it. Highest value of activity concentration has been found at(
... Show MoreIndustrial effluents loaded with heavy metals are a cause of hazards to the humans and other forms of life. Conventional approaches, such as electroplating, ion exchange, and membrane processes, are used for removal of copper, cadmium, and lead and are often cost prohibitive with low efficiency at low metal ion concentration. Biosorption can be considered as an option which has been proven as more efficient and economical for removing the mentioned metal ions. Biosorbents used are fungi, yeasts, oil palm shells, coir pith carbon, peanut husks, and olive pulp. Recently, low cost and natural products have also been researched as biosorbent. This paper presents an attempt of the potential use of Iraqi date pits and Al-Khriet (i.e. substances l
... Show MoreObjective conditions for the possibility of punishment are legal or material facts –positive or negative that depart from the activity of the offender. The legislator comments on their subsequent verification on the formation of some crimes the possibility of.The application of punishment to the offender , but although they are facts of an object nature that approach and overlap with many systems and cases , they are distinguished by a certain subjectivity that differentiates them from each case that may seem similar or approach them. To clarify the ambiguity that may surround these conditions , Which may lead to confusion between them and what be similar to other cases due to the common effect that they have in common , which is the f
... Show More