In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
With the increasing demands to use remote sensing approaches, such as aerial photography, satellite imagery, and LiDAR in archaeological applications, there is still a limited number of studies assessing the differences between remote sensing methods in extracting new archaeological finds. Therefore, this work aims to critically compare two types of fine-scale remotely sensed data: LiDAR and an Unmanned Aerial Vehicle (UAV) derived Structure from Motion (SfM) photogrammetry. To achieve this, aerial imagery and airborne LiDAR datasets of Chun Castle were acquired, processed, analyzed, and interpreted. Chun Castle is one of the most remarkable ancient sites in Cornwall County (Southwest England) that had not been surveyed and explored
... Show MoreBecause of its importance in the world, Middle East area is one of the competition areas between the major and great powers. Among those powers are Russia and United states of America. The competition between these two powers to control Syria is greatly clear since 2011. It is also one of the most important subject in the international politics. This importance comes from the importance of Russia and the United States of America besides importance of the Middle East. At the end of the cold war, United States of America maintained its role in the international system and became the only pole that dominated the international affairs while Russia tried to overcome the challenges inherited from the former Soviet Union, and it succeeded in th
... Show MoreReceipt Date:10/11/2021 Acceptance Date:29/12/2021 Publication Date:31/12/2021
This work is licensed under a Creative Commons Attribution 4.0 International License.
The study aimed to clarify the conceptual explanations and the theoretical rooting of the concept of the populist phenomenon. And explore the political and cultural implications and connotations contained in populist political discourse. And to stand on the foundations and meanings on w
... Show MoreTaking into account the significance of food chains in the environment, it demonstrates the interdependence of all living things and has economic implications for people. Hunting cooperation, fear, and intraspecific competition are all included in a food chain model that has been developed and researched. The study tries to comprehend how these elements affect the behavior of species along the food chain. We first examined the suggested model's solution properties before calculating every potential equilibrium point and examining the stability and bifurcation nearby. We have identified the factors that guarantee the global stability of the positive equilibrium point using the geometric approach. Additionally, the circumstances that would gu
... Show MoreA modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify the va
... Show MoreA modified Leslie-Gower predator-prey model with a Beddington-DeAngelis functional response is proposed and studied. The purpose is to examine the effects of fear and quadratic fixed effort harvesting on the system's dynamic behavior. The model's qualitative properties, such as local equilibria stability, permanence, and global stability, are examined. The analysis of local bifurcation has been studied. It is discovered that the system experiences a saddle-node bifurcation at the survival equilibrium point whereas a transcritical bifurcation occurs at the boundary equilibrium point. Additionally established are the prerequisites for Hopf bifurcation existence. Finally, using MATLAB, a numerical investigation is conducted to verify t
... Show MoreIn this paper, we investigate the connection between the hierarchical models and the power prior distribution in quantile regression (QReg). Under specific quantile, we develop an expression for the power parameter ( ) to calibrate the power prior distribution for quantile regression to a corresponding hierarchical model. In addition, we estimate the relation between the and the quantile level via hierarchical model. Our proposed methodology is illustrated with real data example.
Volleyball is one of the sports that require physical and skill abilities thus many teaching models appeared to teach these abilities like group investigation model. The research aimed at identifying the effect of group investigation model on learning underarm and overhead passing in volleyball. The researchers hypothesized statistical differences between pre and posttests in learning underarm and overhead passing in volleyball as well as differences in posttests of controlling and experimental groups in learning underarm and overhead passing in volleyball. The researcher used the experimental method on (30) second year female students of physical education and sport sciences college/ university of Baghdad. Group investigation model was app
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More