In high-dimensional semiparametric regression, balancing accuracy and interpretability often requires combining dimension reduction with variable selection. This study intro- duces two novel methods for dimension reduction in additive partial linear models: (i) minimum average variance estimation (MAVE) combined with the adaptive least abso- lute shrinkage and selection operator (MAVE-ALASSO) and (ii) MAVE with smoothly clipped absolute deviation (MAVE-SCAD). These methods leverage the flexibility of MAVE for sufficient dimension reduction while incorporating adaptive penalties to en- sure sparse and interpretable models. The performance of both methods is evaluated through simulations using the mean squared error and variable selection criteria, as- sessing the correct detection of zero coefficients and the false omission of nonzero coef- ficients. A practical application involving financial data from the Baghdad Soft Drinks Company demonstrates their utility in identifying key predictors of stock market value. The results indicate that MAVE-SCAD performs well in high-dimensional and complex scenarios, whereas MAVE-ALASSO is better suited to small samples, producing more parsimonious models. These results highlight the effectiveness of these two methods in addressing key challenges in semiparametric modeling
The culture of theatre performance has a vital role in the process of reading the linguistic and visual signs of the performance. And the process of transforming a theatre performance from its original context into a new hosting cultural context starts from the actual reading of the text. Directors derives their new signs out of his personal culture, depending on the society where they lives and the culture that forms the social conventions, traditions and beliefs. The text is usually written within its own historical and temporal culture. The process of its production usually takes it away from its original culture, when it interprets the codes of the original writer and their visual and linguistic signs and instils new alternative sign
... Show MoreIn this research, some robust non-parametric methods were used to estimate the semi-parametric regression model, and then these methods were compared using the MSE comparison criterion, different sample sizes, levels of variance, pollution rates, and three different models were used. These methods are S-LLS S-Estimation -local smoothing, (M-LLS)M- Estimation -local smoothing, (S-NW) S-Estimation-NadaryaWatson Smoothing, and (M-NW) M-Estimation-Nadarya-Watson Smoothing.
The results in the first model proved that the (S-LLS) method was the best in the case of large sample sizes, and small sample sizes showed that the
... Show MoreReceipt date:06/23/2020 accepted date:7/15/2020 Publication date:12/31/2021
This work is licensed under a Creative Commons Attribution 4.0 International License
The executive authority differs from one country to another, as it differs from a federal state to another according to the nature of the applied political systems, so this research focused on federal states according to their political systems, then going into the details of the executive authority and its role In the federal states by referring to the four federal experiments
... Show MoreIn recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreThe primary objective of this paper is to introduce a new concept of fibrewise topological spaces on D is named fibrewise multi- topological spaces on D. Also, we entroduce the concepts of multi-proper, fibrewise multi-compact, fibrewise locally multi-compact spaces, Moreover, we study relationships between fibrewise multi-compact (resp., locally multi-compac) space and some fibrewise multi-separation axioms.
In this paper, we investigate the basic characteristics of "magnetron sputtering plasma" using the target V2O5. The "magnetron sputtering plasma" is produced using "radio frequency (RF)" power supply and Argon gas. The intensity of the light emission from atoms and radicals in the plasma measured by using "optical emission spectrophotometer", and the appeared peaks in all patterns match the standard lines from NIST database and employed are to estimate the plasma parameters, of computes electron temperature and the electrons density. The characteristics of V2O5 sputtering plasma at multiple discharge provisos are studied at the "radio frequency" (RF) power ranging from 75 - 150 Wat
... Show MorePrimary hypogonadism combined with Müllerian hypoplasia and partial alopecia are common features of this syndrome, which was reported only in four earlier families from areas where consanguineous marriage is prevalent. An autosomal recessive pattern of inheritance was suggested earlier and is supported by this report.