يتكون الانحدار المقسم من عدة أقسام تفصل بينها نقاط انتماء مختلفة، فتظهر حالة عدم التجانس الناشئة من عملية فصل الأقسام ضمن عينة البحث. ويهتم هذا البحث في تقدير موقع نقطة التغيير بين الأقسام وتقدير معلمات الأنموذج، واقتراح طريقة تقدير حصينة ومقارنتها مع بعض الطرائق المستعملة في الانحدار الخطي المقسم. وقد تم استعمال أحد الطرائق التقليدية (طريقة Muggeo) لإيجاد مقدرات الإمكان الأعظم بالأسلوب التكراري للأنموذج ونقطة التغيير معاً، واستعمال أحد الطرائق الحصينة (طريقة IRWm) والتي تعتمد على استعمال تقنية M-estimator الحصين في أسلوب التقسيم وباستعمال دالة الوزن Tukey. وتكمن مساهمتنا في هذا البحث في اقتراح استعمال تقنية S-estimator الحصينة وباستعمال دالة الوزن Tukey، للحصول على طريقة حصينة ضد حالات انتهاك شرط التوزيع الطبيعي للأخطاء العشوائية أو تأثير القيم الشاذة، وستدعى هذه الطريقة IRWs. وقد تم تطبيق الطرائق المذكورة آنفاً على مجموعة بيانات حقيقية متعلقة بحمولة قاع نهر دجلة/ مدينة بغداد كمتغير استجابة وكمية تصريف المياه كمتغير توضيحي. وقد أظهرت نتائج المقارنة أفضلية الطريقة المقترحة.
Dust and bird residue are problems impeding the operation of solar street lighting systems, especially in semi-desert areas, such as Iraq. The system in this paper was designed and developed locally using simple and inexpensive materials. The system runs automatically. It Connects to solar panels used in solar street lighting, and gets the required electricity from the same solar system. Solar panels are washed with dripping water in less than half a minute by this system. The cleaning period can also be controlled. It can also control, sensing the amount of dust the system operates. The impact of different types of falling dust on panels has also been studied. This was collected from different winds and studied their impact o
... Show MoreThe research aims to determine the required rate of return according to the Fama and French five-factor model, after strengthening it by adding the indebtedness factor to build the Fama and French six-factor model FF6M-DLE. The effect of the indebtedness factor on the company's profitability and the real value of the ordinary shares calculated according to the (equivalent ascertainment) model and its suitability with the company's situation, and an analysis of the fluctuation between the market value and the real value of the ordinary stocks.
The downhole flow profiles of the wells with single production tubes and mixed flow from more than one layer can be complicated, making it challenging to obtain the average pressure of each layer independently. Production log data can be used to monitor the impacts of pressure depletion over time and to determine average pressure with the use of Selective Inflow Performance (SIP). The SIP technique provides a method of determining the steady state of inflow relationship for each individual layer. The well flows at different stabilized surface rates, and for each rate, a production log is run throughout the producing interval to record both downhole flow rates and flowing pressure. PVT data can be used to convert measured in-situ r
... Show MoreBackground: The access cavity is a critical stage in root canal therapy and it may influence the subsequent steps of the treatment. The new minimally invasive endodontic access cavity preparation concept aims to preserve sound tooth structure by conserving as much intact dentine as possible including the pulp chamber's roof, to keep the teeth from fracturing during and after endodontic treatment. While there is great interest in such access opening designs in numerous publications, still there is a lack of scientific evidence to support the application of such modern access cavity designs in clinical practice. This review aims to critically examine the literature on minimal access cavity preparations, explain the effect of minimally inva
... Show MoreThe Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr
... Show MoreThis study aimed to reveal the extent to which the values of social peace are included in the content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia. To achieve this goal, the researcher used the descriptive analytical approach. The study sample consisted of all developed social and national studies textbooks of the middle stage in kingdom of Saudi Arabia in first and second semester of student books in edition of 1439-1440. The study tool was the analysis card. The study reached the following results: 1-The content of social and national studies textbooks of the middle stage in kingdom of Saudi Arabia as a whole included (38) social peace values of total (40) values, corresponding to the inclusio
... Show More
Abstract
This study aims to identify the reality of using electronic applications in teaching language skills to people with mild intellectual disabilities from the mothers’ perspective. A descriptive approach was used. The electronic questionnaires were administered to the study sample, 122 responses were received from mothers of the students with mild intellectual disability in Hafer Al-Baten schools. The response average rate was 94%. The results showed that there are statistically significant differences that are related to the variant of monthly income as for the barriers to using electronic applications in such schools, whereas there were no differences regarding the variant of monthly income regarding t
... Show MoreThis paper studied the behaviour of reinforced reactive powder concrete (RPC) two-way slabs under static load. The experimental program included testing three simply supported slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. Tested specimens were of identical properties except their steel fibers volume ratio (0.5 %, 1 %, and 1.5 %). Static test results revealed that, increasing steel fibers volume ratio from 0.5% to 1% and from 1% to 1.5%, led to an increase in: first crack load by (32.2 % and 52.3 %), ultimate load by (36.1 % and 17.0 %), ultimate deflection by (33.6 % and 3.4 %), absorbed energy by (128 % and 20.2 %), and the ultimate strain by (1.1 % and 6.73 %). The stiffness and ductility of the specimens also increased. A
... Show More