فًي التحلٌيل اإلحصائ،ً حٌث تعتبر طرٌمة انحدار شرائح تلعب تمنٌات تحلٌل االنحدار الالمعلمً دوراً مركزٌاً لتمهٌد البٌانات، اذ ٌمكن من خاللها تمدٌر الدوال مباشرة من الجزاء واحدة من أكثر الطرائك المستعملة حالٌاً ( بدالً ة البٌانات الصاخبة)التً تحتوي على أخطاء( أو الملوثة )data noisy من االعتماد على نماذج معلمٌ محددة، وتعتمد طرٌمة التمدٌر المستعملة لمالئمه نموذج انحدار شرائح الجزاء فً الغالب على طرائك المربعات الصغرى )OLS)، والتً من المعروف أنها حساسة للمشاهدات غٌر النمطٌة )المتطرفة(، فً هذا البحث سٌتم تمدٌر نماذج انحدار شرائح الجزاء )spline-P )المضافة المعممة باستعمال طرٌمة فصل المصفوفات الدلٌمة المتداخلة )SOP )الممترحة من لبل الباحث )Rodríguez)، واخرون فً عام ،2015 والتً تأخذ المشاهدات المتطرفة فً االعتبار، حٌث ٌعتمد التمدٌر على التكافؤ بٌن )spline-P )والنماذج المختلطة الخطٌة، وٌتم تمدٌر معلمات التباٌن ومعلمات التمهٌد بنا ًء على طرٌمة اإلمكان االعظم الممٌد )REML). ومن اهم االستنتاجات التً تم التوصل الٌها عدم الحاجة الى استعمال طرائك التحسٌن العددي، كما ٌمكن دمج طرٌمة )SOP )بسهولة فً تمدٌر النماذج المختلطة المضافة المعممة )GAMM )مع مجموعات التأثٌرات العشوائٌة المستملة، فضالً عن سرعة تطبٌك طرٌمة )SOP )فً تنفٌذ العملٌات الحسابٌة.
Steganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreThis research deals with a shrinking method concernes with the principal components similar to that one which used in the multiple regression “Least Absolute Shrinkage and Selection: LASS”. The goal here is to make an uncorrelated linear combinations from only a subset of explanatory variables that may have a multicollinearity problem instead taking the whole number say, (K) of them. This shrinkage will force some coefficients to equal zero, after making some restriction on them by some "tuning parameter" say, (t) which balances the bias and variance amount from side, and doesn't exceed the acceptable percent explained variance of these components. This had been shown by MSE criterion in the regression case and the percent explained v
... Show MoreIn this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAleksandr Isayevich Solzhenitsyn was born in 1918 in Kislovodsk. His father was educated, and despite his peasantry origin, he got a university degree. Unfortunately, however, Solzhenitsyn could not recognize his father, for he died before his birth.
Solzhenitsyn was accused of being an opponent to the Soviet Union due to his activities of that time. He was exiled to a forced labour camp for eight years, on the surroundings of Moscow. He spent three years in Kazakhstan, and was sent to the life exile. He was set free in 1956. He worked as a teacher in in rural schools in Vladimir and then in Rezhran.
His greatest works were in the reign of Kherchov, and in 1962 appeared his story under the title of "One day in
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show MoreEach phenomenon contains several variables. Studying these variables, we find mathematical formula to get the joint distribution and the copula that are a useful and good tool to find the amount of correlation, where the survival function was used to measure the relationship of age with the level of cretonne in the remaining blood of the person. The Spss program was also used to extract the influencing variables from a group of variables using factor analysis and then using the Clayton copula function that is used to find the shared binary distributions using multivariate distributions, where the bivariate distribution was calculated, and then the survival function value was calculated for a sample size (50) drawn from Yarmouk Ho
... Show MoreThe General Company for Iraqi Cement is regarded as one of the companies that contribute to support the Iraqi economy. It contributes to provide the material of cement which fulfils the consumer and investment need in the markets in competitive prices and not to resort to the importing of the cement from abroad. That would save a great share of the purchase parity of the poor sectors of society. The estimation of production function will contribute to putting the company.
The application functions of the standard production of benefit critical to clarify the actual relationship between production & its components, & allow to clarify the i
... Show MoreThe objective of the research is to find the best method to estimate rice crop through out evaluating the applied methods of stratified random sampling .By using different sorts of sampling estimators, a comparison was held among the variances of the mean for simple random sampling, stratified random sampling(var()) and separate regression estimator. The results indicate that the separate regression estimator give best estimations. The approximate cum.f4/5 method was used to determine the optimum stratum boundaries, new strata was put and then var () was calculated .In comparison with strata used nowadays in central statistical organization, the new strata led to obvious decrease in the variance. The stratified mean wa
... Show MoreIn this research, the focus was on estimating the parameters on (min- Gumbel distribution), using the maximum likelihood method and the Bayes method. The genetic algorithmmethod was employed in estimating the parameters of the maximum likelihood method as well as the Bayes method. The comparison was made using the mean error squares (MSE), where the best estimator is the one who has the least mean squared error. It was noted that the best estimator was (BLG_GE).