فًي التحلٌيل اإلحصائ،ً حٌث تعتبر طرٌمة انحدار شرائح تلعب تمنٌات تحلٌل االنحدار الالمعلمً دوراً مركزٌاً لتمهٌد البٌانات، اذ ٌمكن من خاللها تمدٌر الدوال مباشرة من الجزاء واحدة من أكثر الطرائك المستعملة حالٌاً ( بدالً ة البٌانات الصاخبة)التً تحتوي على أخطاء( أو الملوثة )data noisy من االعتماد على نماذج معلمٌ محددة، وتعتمد طرٌمة التمدٌر المستعملة لمالئمه نموذج انحدار شرائح الجزاء فً الغالب على طرائك المربعات الصغرى )OLS)، والتً من المعروف أنها حساسة للمشاهدات غٌر النمطٌة )المتطرفة(، فً هذا البحث سٌتم تمدٌر نماذج انحدار شرائح الجزاء )spline-P )المضافة المعممة باستعمال طرٌمة فصل المصفوفات الدلٌمة المتداخلة )SOP )الممترحة من لبل الباحث )Rodríguez)، واخرون فً عام ،2015 والتً تأخذ المشاهدات المتطرفة فً االعتبار، حٌث ٌعتمد التمدٌر على التكافؤ بٌن )spline-P )والنماذج المختلطة الخطٌة، وٌتم تمدٌر معلمات التباٌن ومعلمات التمهٌد بنا ًء على طرٌمة اإلمكان االعظم الممٌد )REML). ومن اهم االستنتاجات التً تم التوصل الٌها عدم الحاجة الى استعمال طرائك التحسٌن العددي، كما ٌمكن دمج طرٌمة )SOP )بسهولة فً تمدٌر النماذج المختلطة المضافة المعممة )GAMM )مع مجموعات التأثٌرات العشوائٌة المستملة، فضالً عن سرعة تطبٌك طرٌمة )SOP )فً تنفٌذ العملٌات الحسابٌة.
In this article we study a single stochastic process model for the evaluate the assets pricing and stock.,On of the models le'vy . depending on the so –called Brownian subordinate as it has been depending on the so-called Normal Inverse Gaussian (NIG). this article aims as the estimate that the parameters of his model using my way (MME,MLE) and then employ those estimate of the parameters is the study of stock returns and evaluate asset pricing for both the united Bank and Bank of North which their data were taken from the Iraq stock Exchange.
which showed the results to a preference MLE on MME based on the standard of comparison the average square e
... Show MoreHuman posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre
... Show MoreThis paper deals to how to estimate points non measured spatial data when the number of its terms (sample spatial) a few, that are not preferred for the estimation process, because we also know that whenever if the data is large, the estimation results of the points non measured to be better and thus the variance estimate less, so the idea of this paper is how to take advantage of the data other secondary (auxiliary), which have a strong correlation with the primary data (basic) to be estimated single points of non-measured, as well as measuring the variance estimate, has been the use of technique Co-kriging in this field to build predictions spatial estimation process, and then we applied this idea to real data in th
... Show MoreEstimation of the tail index parameter of a one - parameter Pareto model has wide important by the researchers because it has awide application in the econometrics science and reliability theorem.
Here we introduce anew estimator of "generalized median" type and compare it with the methods of Moments and Maximum likelihood by using the criteria, mean square error.
The estimator of generalized median type performing best over all.
Often phenomena suffer from disturbances in their data as well as the difficulty of formulation, especially with a lack of clarity in the response, or the large number of essential differences plaguing the experimental units that have been taking this data from them. Thus emerged the need to include an estimation method implicit rating of these experimental units using the method of discrimination or create blocks for each item of these experimental units in the hope of controlling their responses and make it more homogeneous. Because of the development in the field of computers and taking the principle of the integration of sciences it has been found that modern algorithms used in the field of Computer Science genetic algorithm or ant colo
... Show MoreIn this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q, this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo
... Show MoreIn this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show More