This paper proposed a new method to study functional non-parametric regression data analysis with conditional expectation in the case that the covariates are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables. It utilized the formula of the Nadaraya Watson estimator (K-Nearest Neighbour (KNN)) for prediction with different types of the semi-metrics, (which are based on Second Derivative and Functional Principal Component Analysis (FPCA)) for measureing the closeness between curves. Root Mean Square Errors is used for the implementation of this model which is then compared to the independent response method. R program is used for analysing data. Then, when the covariates are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables model, results are more preferable than the independent response method. The models are demonstrated by both a simulation data and real data.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreTwo EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreInvestigation of the adsorption of acid fuchsin dye (AFD) on Zeolite 5A is carried out using batch scale experiments according to statistical design. Adsorption isotherms, kinetics and thermodynamics were demonstrated. Results showed that the maximum removal efficiency was using zeolite at a temperature of 93.68751 mg/g. Experimental data was found to fit the Langmuir isotherm and pseudo second order kinetics with maximum removal of about 95%. Thermodynamic analysis showed an endothermic adsorption. Optimization was made for the most affecting operating variables and a model equation for the predicted efficiency was suggested.
This paper deals with the role of the clergy in the Church and artists in the emergence of this art, which is represented by an atmosphere of spiritual, aesthetic, artistic, technical and engineering very magnificence and is located in two Find.Chapter One: the stages of stained glass in the Middle AgesThe Architects Goths to get rid of the walls gradually, based Baloctav plane, columns and beams strengthened with the vehicle, as previously mentioned, making the building looks like a glass of excessive use of colored windows building, this art has been known to the art of stained glass And the second chapter: the stages of stained glass in the Middle Ages Department of Winston (Winston) works of stained glass since its inception in the t
... Show MoreThe paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)
Abstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreA comparative investigation of the anatomical characters through a microscopical examination of the prepared transverse sections of the stem was carried out. Six plates with 32 photomicrographs were provided to convincingly show the considerable variations of anatomical characters within the nine examined species. The matrix of 18 anatomical characters which included nine quantitative and nine qualitative was applied for the clustering analysis (CA) followed by the principal component analysis (PCA) using the Multivariate Analysis of Ecological Data, PC-ORD.
The results exhibited significant variations among the species resulting in the construction of an artificial key; this key accurately represents a sufficient tool to display the
Objectives: The purpose of the study is to ascertain the relationship between the training program and the socio-demographic features of patients with peptic ulcers in order to assess the efficiency of the program on patients' nutritional habits.
Methodology: Between January 17 and October 30 of 2022, The Center of Gastrointestinal Medicine and Surgery at Al-Diwanyiah Teaching Hospital conducted "a quasi-experimental study". A non-probability sample of 30 patients for the case group and 30 patients for the control group was selected based on the study's criteria. The study instrument was divided into 4 sections: the first portion contained 7 questions about demographic information, the second sect
... Show More