In this research، a comparison has been made between the robust estimators of (M) for the Cubic Smoothing Splines technique، to avoid the problem of abnormality in data or contamination of error، and the traditional estimation method of Cubic Smoothing Splines technique by using two criteria of differentiation which are (MADE، WASE) for different sample sizes and disparity levels to estimate the chronologically different coefficients functions for the balanced longitudinal data which are characterized by observations obtained through (n) from the independent subjects، each one of them is measured repeatedly by group of specific time points (m)،since the frequent measurements within the subjects are almost connected and independent among the different subjects
To perform a secure evaluation of Indoor Design data, the research introduces a Cyber-Neutrosophic Model, which utilizes AES-256 encryption, Role-Based Access Control, and real-time anomaly detection. It measures the percentage of unpredictability, insecurity, and variance present within model features. Also, it provides reliable data security. Similar features have been identified between the final results of the study, corresponding to the Cyber-Neutrosophic Model analysis, and the cybersecurity layer helped mitigate attacks. It is worth noting that Anomaly Detection successfully achieved response times of less than 2.5 seconds, demonstrating that the model can maintain its integrity while providing privacy. Using neutrosophic sim
... Show MoreThe mass attenuation coefficient for beta particles through pure Polyvinyl chloride (PVC) and flax fibers- reinforced PVC composite were investigated as a function of the absorber thickness and the absorber to source distance. The beta particles mass attenuation coefficients were obtained using a NaI(Tl) energy selective scintillation counter with 90Sr/ 90Y beta source having an energy range from (0.546-2.275) MeV. Pure PVC polymer samples were prepared by compacting the PVC powder in a mould at high pressure (10bar) and temperature about 140°C for 30 minutes. A hot press system was used for this process. The experimentally obtained values of mass attenuation coefficients for 90Sr and 90Y were found to be 7.72 cm2.g-1and 0.842 cm2.g-1 r
... Show MoreThe purpose of this study is to investigate learners' listening comprehension problems with Englishlectures. The study was guided by research question (What are the listening comprehension problems learners have with lectures in English).Furthermore; the main significant goal were declared through conducting this study, as well as providing some procedures of distribution the questionnaire of the study.Moreover, it presents several definitions of listening. This study definitely depends on questionnaire instrument to gathering the required data. The participants of the study were 30 learners completed their secondary school and joined at the college. Based on the findings among the five factors (text, speaker, task, environment, and list
... Show MoreIn general, researchers and statisticians in particular have been usually used non-parametric regression models when the parametric methods failed to fulfillment their aim to analyze the models precisely. In this case the parametic methods are useless so they turn to non-parametric methods for its easiness in programming. Non-parametric methods can also used to assume the parametric regression model for subsequent use. Moreover, as an advantage of using non-parametric methods is to solve the problem of Multi-Colinearity between explanatory variables combined with nonlinear data. This problem can be solved by using kernel ridge regression which depend o
... Show MoreAbstract:
Research Topic: Ruling on the sale of big data
Its objectives: a statement of what it is, importance, source and governance.
The methodology of the curriculum is inductive, comparative and critical
One of the most important results: it is not permissible to attack it and it is a valuable money, and it is permissible to sell big data as long as it does not contain data to users who are not satisfied with selling it
Recommendation: Follow-up of studies dealing with the provisions of the issue
Subject Terms
Judgment, Sale, Data, Mega, Sayings, Jurists
In this study, an efficient compression system is introduced, it is based on using wavelet transform and two types of 3Dimension (3D) surface representations (i.e., Cubic Bezier Interpolation (CBI)) and 1 st order polynomial approximation. Each one is applied on different scales of the image; CBI is applied on the wide area of the image in order to prune the image components that show large scale variation, while the 1 st order polynomial is applied on the small area of residue component (i.e., after subtracting the cubic Bezier from the image) in order to prune the local smoothing components and getting better compression gain. Then, the produced cubic Bezier surface is subtracted from the image signal to get the residue component. Then, t
... Show MoreThyroid disease is a common disease affecting millions worldwide. Early diagnosis and treatment of thyroid disease can help prevent more serious complications and improve long-term health outcomes. However, thyroid disease diagnosis can be challenging due to its variable symptoms and limited diagnostic tests. By processing enormous amounts of data and seeing trends that may not be immediately evident to human doctors, Machine Learning (ML) algorithms may be capable of increasing the accuracy with which thyroid disease is diagnosed. This study seeks to discover the most recent ML-based and data-driven developments and strategies for diagnosing thyroid disease while considering the challenges associated with imbalanced data in thyroid dise
... Show MoreThere are two ways that the contract might be formed with (contracting between persons who are attended and contracting between absence persons).the need for determining the precise moment of the contract , is so clear because there is a specify period separate between the declaration of acceptance and the knowledge with it .and it is clear from the four theories known for jurisprudence (theory of the declaration of the acceptance, theory of exporting the acceptance , theory of the arrival of the acceptance , theory of the knowledge with the acceptance ) . It is difficult to promote one theory on another one if we look at each one and the justification of its supporters and what the opponents of each theory expose. Legal background and diff
... Show More