In this paper new methods were presented based on technique of differences which is the difference- based modified jackknifed generalized ridge regression estimator(DMJGR) and difference-based generalized jackknifed ridge regression estimator(DGJR), in estimating the parameters of linear part of the partially linear model. As for the nonlinear part represented by the nonparametric function, it was estimated using Nadaraya Watson smoother. The partially linear model was compared using these proposed methods with other estimators based on differencing technique through the MSE comparison criterion in simulation study.
In this study, the performance of the adaptive optics (AO) system was analyzed through a numerical computer simulation implemented in MATLAB. Making a phase screen involved turning computer-generated random numbers into two-dimensional arrays of phase values on a sample point grid with matching statistics. Von Karman turbulence was created depending on the power spectral density. Several simulated point spread functions (PSFs) and modulation transfer functions (MTFs) for different values of the Fried coherent diameter (ro) were used to show how rough the atmosphere was. To evaluate the effectiveness of the optical system (telescope), the Strehl ratio (S) was computed. The compensation procedure for an AO syst
... Show MoreAbstract The aim of this study is to identify the role played by the university in reinforcing the culture of voluntary work in college students and sequencing these roles according to their priority. To achieve this aim, the researcher used the descriptive approach. After being informed of the literature background and of the previous studies related to the core aim of this recent study, the researcher has built up a questionnaire of (20) items investigating the role of university in reinforcing the culture of voluntary work in the college students. The standardized features of the questionnaire have been checked for the purpose of the questionnaire validity (virtual and constructive validity) and stability (reconstruction and Cronbach's A
... Show MoreThe Purpose of this research is analysis and discussion " The Effect of Insurace Company Capital Adequacy in it’s Profitafility: An Empirical Study compared the two insurance (national, Iraqi), for a period of one year (2005) and the year (2014), as it is framed theoretical side for two topics head adequacy money the insurance company, and the profitability of the insurance company, and I've been using the research methodology and analytical, in the analysis and measurement of the capital of the insurance company adequacy, and profitability of the company, as the capital adequacy ratio was measured by dividing the total capital available on the total capital rate risk, after measured and appreciated in two insurance research, while I u
... Show MoreIn this paper We introduce some new types of almost bi-periodic points in topological bitransfprmation groups and thier effects on some types of minimaliy in topological dynamics
Between the 1980s and 1990s, the HURIER model was developed by Brownell and consist of six interrelated components, which are represented in these acronyms (Hearing, Understanding, Remembering, Interpreting, Evaluating, and Responding). This model can be considered as a framework of the behavioral approach which can be used to improve students’ listening performance and to foster a positive attitude toward listening. Many learners find it challenging to improve their listening skills when learning a second or foreign language because it requires the integration of both listening and speaking. Consequently, enhancing this skill will help students improve other language skills, including reading, speaking, and writing. The HURI
... Show MoreThe technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num
... Show MoreData security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show More
