Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the parametric part, a method has been developed to estimate the parametric of the partial linear regression model represented by weighted estimators as well as by the suggested method (EMBW). Two methods of the simulation were compared using three sizes (n = 100,150,200) and using three different values for and zero mean and it was found that the proposed method (EMBW) was superior to the weighted estimator method.
Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe study aimed at identifying the strategic gaps in the actual reality of the management of public organizations investigated to determine the strategy used based on the study model. The study relied on the variable of the general organization strategy in its dimensions (the general organization strategy, the organization's political strategy and the defense strategy of the organization) The sample of the study was (General Directorate of Traffic, Civil Status Directorate and Civil Defense Directorate), formations affiliated to the Ministry of the Interior, for the importance of the activity carried out by these public organizations by providing them In order to translate the answers into a quantitative expression in the analysi
... Show MoreBackground: The change in the concepts of cavity preparation and the development of reliable adhesive materials lead to the development of alternative methods of caries removal. Chemo-mechanical caries removal (CMCR) involves the chemical softening of carious dentin, followed by its removal with manual excavation. The present study was conducted to evaluate clinically the efficiency of caries removal using a new chemo-mechanical agent (Papacarie) compared to the conventional drilling method in reduction of total bacterial count. Material and methods: The study is a split mouth design. The sample composes from sixty mandibular deciduous molars teeth in thirty children, between six to nine years of age with bilateral class I deep occlusal car
... Show MoreIn this paper, we derived an estimator of reliability function for Laplace distribution with two parameters using Bayes method with square error loss function, Jeffery’s formula and conditional probability random variable of observation. The main objective of this study is to find the efficiency of the derived Bayesian estimator compared to the maximum likelihood of this function and moment method using simulation technique by Monte Carlo method under different Laplace distribution parameters and sample sizes. The consequences have shown that Bayes estimator has been more efficient than the maximum likelihood estimator and moment estimator in all samples sizes
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreEncryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show Moreفي هذا البحث نحاول تسليط الضوء على إحدى طرائق تقدير المعلمات الهيكلية لنماذج المعادلات الآنية الخطية والتي تزودنا بتقديرات متسقة تختلف أحيانا عن تلك التي نحصل عليها من أساليب الطرائق التقليدية الأخرى وفق الصيغة العامة لمقدرات K-CLASS. وهذه الطريقة تعرف بطريقة الإمكان الأعظم محدودة المعلومات "LIML" أو طريقة نسبة التباين الصغرى"LVR
... Show MoreA spectrophotometric- reverse flow injection analysis (rFIA) method has been proposed for the determination of Nitrazepam (NIT) in pure and pharmaceutical preparations. The method is based upon the coupling reaction of NIT with a new reagent O-Coumaric acid (OCA) in the presence of sodium periodate in an aqueous solution. The blue color product was measured at 632 nm. The variation (chemical and physical parameters) related with reverse flow system were estimated. The linearity was over the range 15 - 450 µg/mL of NIT with detection limits and limit of quantification of 3.425 and 11.417 µg mL-1 NIT,respectively. The sample throughput of 28 samples
... Show More