Artificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing artificial TABU algorithm to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as sport, chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement.
Writing plays an effective role in developing one's thinking and
enhancing Learning. It is, in fact, a means of widening one's own views about
the world for the numerous uses that it can serve (Samuel, 1988:28).
In regard to the unquestionable significance of writing in the teaching –
Learning process, the traditional approach seems to be far from being able to
put such significance into practice. Traditionalists give priority to formulating
students' ideas before using prescribed rhetorical framework and then
submitting the written product for grading. Emphasis is, therefore, limited to the
prewriting stage where a certain topic is explored, and the role of the teacher is
confined to assigning the topic and
Productivity estimating of ready mixed concrete batch plant is an essential tool for the successful completion of the construction process. It is defined as the output of the system per unit of time. Usually, the actual productivity values of construction equipment in the site are not consistent with the nominal ones. Therefore, it is necessary to make a comprehensive evaluation of the nominal productivity of equipment concerning the effected factors and then re-evaluate them according to the actual values.
In this paper, the forecasting system was employed is an Artificial Intelligence technique (AI). It is represented by Artificial Neural Network (ANN) to establish the predicted model to estimate wet ready mixe
... Show MoreThis paper shews how to estimate the parameter of generalized exponential Rayleigh (GER) distribution by three estimation methods. The first one is maximum likelihood estimator method the second one is moment employing estimation method (MEM), the third one is rank set sampling estimator method (RSSEM)The simulation technique is used for all these estimation methods to find the parameters for generalized exponential Rayleigh distribution. Finally using the mean squares error criterion to compare between these estimation methods to find which of these methods are best to the others
Some physical properties enthalpy (?H), entropy (?s), free energy (?G),capacities(?cp?) and Pka values) for valine in dimethyl foramideover the temperature range 293.15-318.15K, were determined by direct conductance measurements. The acid dissociation at six temperature was examined at solvent composition x2) involving 0.141 of dimethyl foramide . As results, calculated values have been used to determine the dissociation constant and the associated thermodynamic function for the valine in the solvent mixture over temperatures in the range 293.15-318.15 k. The Pka1, and Pka2 were increased with increasing temperature.
sanaa tareq, Baghdad Science Journal, - Cited by 1
Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreThis paper presents a linear fractional programming problem (LFPP) with rough interval coefficients (RICs) in the objective function. It shows that the LFPP with RICs in the objective function can be converted into a linear programming problem (LPP) with RICs by using the variable transformations. To solve this problem, we will make two LPP with interval coefficients (ICs). Next, those four LPPs can be constructed under these assumptions; the LPPs can be solved by the classical simplex method and used with MS Excel Solver. There is also argumentation about solving this type of linear fractional optimization programming problem. The derived theory can be applied to several numerical examples with its details, but we show only two examples
... Show MoreThe High Power Amplifiers (HPAs), which are used in wireless communication, are distinctly characterized by nonlinear properties. The linearity of the HPA can be accomplished by retreating an HPA to put it in a linear region on account of power performance loss. Meanwhile the Orthogonal Frequency Division Multiplex signal is very rough. Therefore, it will be required a large undo to the linear action area that leads to a vital loss in power efficiency. Thereby, back-off is not a positive solution. A Simplicial Canonical Piecewise-Linear (SCPWL) model based digital predistorters are widely employed to compensating the nonlinear distortion that introduced by a HPA component in OFDM technology. In this paper, the genetic al
... Show MoreThis research aims to clarify the advantages of using the regression method as analytical procedure in the tax audit to reducing the examination cost , time, effort, human and material resources, and represents an applied study in the General Commission of taxes. In order to achieve its objectives the research has used in the theoretical side the descriptive approach (analytical), and in the practical side regression method has been applied to the research sample represented by the soft drinks company that is subject to the tax settlement for the year 2014, where the value of sales has been verified by using the regression method without conductinga comprehensive examination. The most important results of the research indicate that the r
... Show MoreThis paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis