فًي التحلٌيل اإلحصائ،ً حٌث تعتبر طرٌمة انحدار شرائح تلعب تمنٌات تحلٌل االنحدار الالمعلمً دوراً مركزٌاً لتمهٌد البٌانات، اذ ٌمكن من خاللها تمدٌر الدوال مباشرة من الجزاء واحدة من أكثر الطرائك المستعملة حالٌاً ( بدالً ة البٌانات الصاخبة)التً تحتوي على أخطاء( أو الملوثة )data noisy من االعتماد على نماذج معلمٌ محددة، وتعتمد طرٌمة التمدٌر المستعملة لمالئمه نموذج انحدار شرائح الجزاء فً الغالب على طرائك المربعات الصغرى )OLS)، والتً من المعروف أنها حساسة للمشاهدات غٌر النمطٌة )المتطرفة(، فً هذا البحث سٌتم تمدٌر نماذج انحدار شرائح الجزاء )spline-P )المضافة المعممة باستعمال طرٌمة فصل المصفوفات الدلٌمة المتداخلة )SOP )الممترحة من لبل الباحث )Rodríguez)، واخرون فً عام ،2015 والتً تأخذ المشاهدات المتطرفة فً االعتبار، حٌث ٌعتمد التمدٌر على التكافؤ بٌن )spline-P )والنماذج المختلطة الخطٌة، وٌتم تمدٌر معلمات التباٌن ومعلمات التمهٌد بنا ًء على طرٌمة اإلمكان االعظم الممٌد )REML). ومن اهم االستنتاجات التً تم التوصل الٌها عدم الحاجة الى استعمال طرائك التحسٌن العددي، كما ٌمكن دمج طرٌمة )SOP )بسهولة فً تمدٌر النماذج المختلطة المضافة المعممة )GAMM )مع مجموعات التأثٌرات العشوائٌة المستملة، فضالً عن سرعة تطبٌك طرٌمة )SOP )فً تنفٌذ العملٌات الحسابٌة.
The research aims to estimate missing values using covariance analysis method Coons way to the variable response or dependent variable that represents the main character studied in a type of multi-factor designs experiments called split block-design (SBED) so as to increase the accuracy of the analysis results and the accuracy of statistical tests based on this type of designs. as it was noted in the theoretical aspect to the design of dissident sectors and statistical analysis have to analyze the variation in the experience of experiment )SBED) and the use of covariance way coons analysis according to two methods to estimate the missing value, either in the practical side of it has been implemented field experiment wheat crop in
... Show MoreThe recent development in statistics has made statistical distributions the focus of researchers in the process of compensating for some distribution parameters with fixed values and obtaining a new distribution, in this study, the distribution of Kumaraswamy was studied from the constant distributions of the two parameters. The characteristics of the distribution were discussed through the presentation of the probability density function (p.d.f), the cumulative distribution function (c.d.f.), the ratio of r, the reliability function and the hazard function. The parameters of the Kumaraswamy distribution were estimated using MLE, ME, LSEE by using the simulation method for different sampling sizes and using preli
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreOften phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo
... Show More
In this article we study a single stochastic process model for the evaluate the assets pricing and stock.,On of the models le'vy . depending on the so –called Brownian subordinate as it has been depending on the so-called Normal Inverse Gaussian (NIG). this article aims as the estimate that the parameters of his model using my way (MME,MLE) and then employ those estimate of the parameters is the study of stock returns and evaluate asset pricing for both the united Bank and Bank of North which their data were taken from the Iraq stock Exchange.
which showed the results to a preference MLE on MME based on the standard of comparison the average square e
... Show MoreAleksandr Isayevich Solzhenitsyn was born in 1918 in Kislovodsk. His father was educated, and despite his peasantry origin, he got a university degree. Unfortunately, however, Solzhenitsyn could not recognize his father, for he died before his birth.
Solzhenitsyn was accused of being an opponent to the Soviet Union due to his activities of that time. He was exiled to a forced labour camp for eight years, on the surroundings of Moscow. He spent three years in Kazakhstan, and was sent to the life exile. He was set free in 1956. He worked as a teacher in in rural schools in Vladimir and then in Rezhran.
His greatest works were in the reign of Kherchov, and in 1962 appeared his story under the title of "One day in
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreDeep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to
... Show More