This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters (as done in the first edition 2019). Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. While the revised new chapters have been added (as the current second edition 2024). Chapter six introduces mean vector estimation and covariance matrix estimation. Chapter seven devotes to testing concerning mean: one sample mean, and two sample mean. Chapter eight discusses special case of factorial analysis which is principal components analysis. Chapter nine deals with discriminant analysis. While chapter ten deals with cluster analysis. Many solved examples are intended in this book, in addition to a variety of unsolved relied problems at the end of each chapter to enrich the statistical knowledge of the readers.
The present study aims to present a proposed realistic and comprehensive cyber strategy for the Communications Directorate for the next five years (2022-2026) based on the extent of application and documentation of cybersecurity measures in the Directorate and the scientific bases formulating the strategy. The present study is significant in that it provides an accurate diagnosis of the capabilities of the cyber directorate in terms of strengths and weaknesses in its internal environment and the opportunities and threats that surround it in the external environment, based on the results of the assessment of the reality of cybersecurity according to the global Cybersecurity index, which provides a strong basis for building its strategic dire
... Show MoreTransgenic plants offer advantages for the manufacture of recombinant proteins with terminal
mannose residues on their glycan chains. So plants are chosen as source of pharmaceutical products and for
the development of alternative expression systems to produce recombinant lysosomal enzymes. In the
present study the sequence of the natural cDNA encoding for the human lysosomal enzyme
glucocerebrosidase (GCD) was modified to enhance its expression in soybean plants. The glucocerebrosidase
gene signal peptide was substituted with that signal peptide for the Arabidopsis thaliana basic endochitinase
gene to support the co-translational translocation into the endoplasmic reticulum (ER), and the storage
vacuol
An effective two-body density operator for point nucleon system
folded with the tenser force correlations( TC's), is produced and used
to derive an explicit form for ground state two-body charge density
distributions (2BCDD's) applicable for 25Mg, 27Al and 29Si nuclei. It is
found that the inclusion of the two-body TC's has the feature of
increasing the central part of the 2BCDD's significantly and reducing
the tail part of them slightly, i.e. it tends to increase the probability of
transferring the protons from the surface of the nucleus towards its
centeral region and consequently makes the nucleus to be more rigid
than the case when there is no TC's and also leads to decrease the
1/ 2
r 2 of the nucleu
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More
The quadrupole moment of 14B exotic nucleus has been calculated using configuration mixing shell model with limiting number of orbital's in the model space. The core- polarization effects, are included through a microscopic theory which considers a particle-hole excitations from the core and the model space orbits into the higher orbits with 6ħω excitations using M3Y interaction. The simple harmonic oscillator potential is used to generate the single particle wave functions. Large basis no-core shell model with (0+2)ћω truncation is used for 14B nucleus. The effective charges for the protons and neutrons were calculated su |
The research aims to identify the extent to which Iraqi private banks practice profit management motivated by reducing the taxable base by increasing the provision for loan losses by relying on the LLP it model, which consists of a main independent variable (net profit before tax) and independent sub-variables (bank size, total debts to total equity, loans granted to total obligations) under the name of the variables governing the banking business. (Colmgrove-Smirnov) was used to test the normal distribution of data for all banks during the period 2017-2020, and then find the correlation between the main independent variable sub and the dependent variable by means of the correlation coefficient person, and then using the multiple
... Show MoreIn this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.
In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.
In this paper, a fixed point theorem of nonexpansive mapping is established to study the existence and sufficient conditions for the controllability of nonlinear fractional control systems in reflexive Banach spaces. The result so obtained have been modified and developed in arbitrary space having Opial’s condition by using fixed point theorem deals with nonexpansive mapping defined on a set has normal structure. An application is provided to show the effectiveness of the obtained result.
Background: The prevalence of both obesity & diabetes are increasing all over the world & more in women. They have a negative impact not only on morbidity & mortality but also on quality of life.
Objectives: To assess the HRQoL with a specific comparison between obese & normal weight among wo
... Show More