Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage and Selection Operator (Lasso), and Tikhonov Regularization (Ridge). The simulation studiesshow that the performance of our method is better than the othersaccording to the error and the time complexity. Thesemethodsare applied to a real dataset, which is called Rock StrengthDataset.The new approach implemented using the Gibbs sampler is more powerful and effective than other approaches.All the statistical computations conducted for this paper are done using R version 4.0.3 on a single processor computer.
This researchpaper includes the incorporation of Alliin at various energy levels and angles
With Metformin using Gaussian 09 and Gaussian view 06. Two computers were used in this work. Samples were generated to draw, integrate, simulate and measure the value of the potential energy surface by means of which the lowest energy value was (-1227.408au). The best correlation compound was achieved between Alliin and Metformin through the low energy values where the best place for metformin to b
... Show MoreSoaking dentures with disinfection solutions is an effective way of keeping dentures in a healthy status; however, immersions in these solutions have a negative effect on the bond strength of denture base and denture teeth. The aim of this study was to evaluate the bond strength between denture acrylic teeth and heat-cured Poly (methyl methacrylate) denture base material (with and without nano silica) after disinfection with different chemical disinfectants for a simulated period of six months. One hundred specimens of maxillary central incisors attached to PMMA were divided into two groups; 50 specimens of PMMA without nano silica and 50 specimens of PMMA reinforced with 5 wt% of nano silica. Specimens of each group were immersed in five i
... Show MoreBackground: The bond strength of root canal sealers to dentin and gutta-percha seems to be an important property for maintaining the stability of root canal filling, which potentially influences both leakage and root strength. The objective of this, in vitro, study was to evaluate the shear bond strength of three different endodontic sealers (Gutta-Flow, AH Plus, Apexit Plus) to dentin, in the presence and absence of the smear layer and gutta percha. Material and Methods: After slicing off the occlusal 2mm of 60 extracted human maxillary premolar teeth, the exposed dentin served as the tested surfaces; the teeth were fixed with cold cure acrylic, and were divided into two groups according to the smear layer presence, group A without smear
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show MoreWith the development of cloud computing during the latest years, data center networks have become a great topic in both industrial and academic societies. Nevertheless, traditional methods based on manual and hardware devices are burdensome, expensive, and cannot completely utilize the ability of physical network infrastructure. Thus, Software-Defined Networking (SDN) has been hyped as one of the best encouraging solutions for future Internet performance. SDN notable by two features; the separation of control plane from the data plane, and providing the network development by programmable capabilities instead of hardware solutions. Current paper introduces an SDN-based optimized Resch
The ability of the human brain to communicate with its environment has become a reality through the use of a Brain-Computer Interface (BCI)-based mechanism. Electroencephalography (EEG) has gained popularity as a non-invasive way of brain connection. Traditionally, the devices were used in clinical settings to detect various brain diseases. However, as technology advances, companies such as Emotiv and NeuroSky are developing low-cost, easily portable EEG-based consumer-grade devices that can be used in various application domains such as gaming, education. This article discusses the parts in which the EEG has been applied and how it has proven beneficial for those with severe motor disorders, rehabilitation, and as a form of communi
... Show MoreJPEG is most popular image compression and encoding, this technique is widely used in many applications (images, videos and 3D animations). Meanwhile, researchers are very interested to develop this massive technique to compress images at higher compression ratios with keeping image quality as much as possible. For this reason in this paper we introduce a developed JPEG based on fast DCT and removed most of zeros and keeps their positions in a transformed block. Additionally, arithmetic coding applied rather than Huffman coding. The results showed up, the proposed developed JPEG algorithm has better image quality than traditional JPEG techniques.
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More