Segmented regression consists of several sections separated by different points of membership, showing the heterogeneity arising from the process of separating the segments within the research sample. This research is concerned with estimating the location of the change point between segments and estimating model parameters, and proposing a robust estimation method and compare it with some other methods that used in the segmented regression. One of the traditional methods (Muggeo method) has been used to find the maximum likelihood estimator in an iterative approach for the model and the change point as well. Moreover, a robust estimation method (IRW method) has used which depends on the use of the robust M-estimator technique in segmentation ideas and using the Tukey weight function. The research’s contribution lies in the suggestion to use the S-estimator technique and using the Tukey weight function, to obtain a robust method against cases of violation of the normal distribution condition for random errors or the effect of outliers, and this method will be called IRWs. The mentioned methods have been applied to a real data set related to the bed-load of Tigris River/ Baghdad city as a response variable and the amount of water discharge as an explanatory variable. The results of the comparison showed the superiority of the proposed method.
Human Interactive Proofs (HIPs) are automatic inverse Turing tests, which are intended to differentiate between people and malicious computer programs. The mission of making good HIP system is a challenging issue, since the resultant HIP must be secure against attacks and in the same time it must be practical for humans. Text-based HIPs is one of the most popular HIPs types. It exploits the capability of humans to recite text images more than Optical Character Recognition (OCR), but the current text-based HIPs are not well-matched with rapid development of computer vision techniques, since they are either vey simply passed or very hard to resolve, thus this motivate that
... Show MoreA study of non-diatom algal species composition in twelve sites from Greater Zab River path within
Erbil Province, was carried out from April 2021 to January 2022 with monthly sample collection in twelve studied sites. Among them site 4,5,6,7 and 9 are the first for algal study in this area. The 112 different species of algae belong to 33 genera, 25 families, 13 orders and 4 divisions have been identified. The predominant genera included Spirogyra and Cosmarium 17, 8 taxa respectively. 13 taxa were new recorded to Iraqi
Kurdistan algal flora and 9 of them were new recorded to Iraqi algal flora: Botryosphaerella sudetica, Muriella magna, Gloeotaenium loitlesbergianum, Apiocystis brauniana, Anabaena oscillarioides, C. distentum
Rock mechanical properties are critical parameters for many development techniques related to tight reservoirs, such as hydraulic fracturing design and detecting failure criteria in wellbore instability assessment. When direct measurements of mechanical properties are not available, it is helpful to find sufficient correlations to estimate these parameters. This study summarized experimentally derived correlations for estimating the shear velocity, Young's modulus, Poisson's ratio, and compressive strength. Also, a useful correlation is introduced to convert dynamic elastic properties from log data to static elastic properties. Most of the derived equations in this paper show good fitting to measured data, while some equations show scatters
... Show MoreObjectives: To assess quality of health care for clients at outpatient consultancy clinics in Al-Hilla City Hospitals, and to find out significant differences between the clients' perspectives toward quality of health care dimensions and their demographic characteristics such as (residence, age, gender, level of education, and occupation ).
Methodology: A descriptive analytic study design was carried out at outpatient consultancy clinics of Al- Hilla city hospital (Al-Hilla and Al-Imam Al-Sadiq general teaching hospital) from April 10 th to June 15 th 2019. Non – probability (purposive) sample of 200 clients who were coming to the Outpatient Consultancy Clinics were selected. Data is collected through used of an assessment tools an
Objective: To find out the relationship between the bio-social aspect with cholelithiasis patients and
demographic characteristics in Baghdad city.
Methodology: A purposive (non-probability) sample of (100) patients, from (20-70) years old, who were
selected from patients who were admitted to hospital at preoperative stage, from Gastroenterology and
Hepatology Hospital, Baghdad Teaching Hospital, Al-Yarmook Teaching Hospital, Al-Karama Teaching
Hospital, Teaching Hospital. A descriptive study was carried out from 25th of June 2004 to the end of October
2004.
An assessment form was constructed for the purpose of the study. Test-retest reliability was employed through
computation of Pearson correlation coefficient.
В статье рассматривается вопрос об использовании мультимедийных средств для оптимизации процесса формирования коммуникативной компетенции в иракской аудитории с привлечением компьютерных технологий. Статья посвящена использованию мультимедийных технологий и различных приемов формирования интереса к русскому языку. Включение в процесс обучения коммуникативно-значимого, аутентичн
... Show MoreThis research aims to demonstrate the impact of the going concern assumption in different accounting applications to provide a realistic look and more accurate result of activity and financial situation, as well as determining the responsibility of the Company's administration in compliance with the going concern assumption during the preparation for their financial statements, and to clarify the concept of integration between internal audit and external audit about going concern assumption, besides its importance and usefulness on the work of both of the internal auditor and the external auditor, as well as on the company under auditing process.This research purports preparing an internal audit program, including a set of auditing actio
... Show MoreDielectric barrier discharges (DBD) can be described as the presence of contact with the discharge of one or more insulating layers located between two cylindrical or flat electrodes connected to an AC/pulse dc power supply. In this work, the properties of the plasma generated by dielectric barrier discharge (DBD) system without and with a glass insulator were studied. The plasma was generated at a constant voltage of 4 kV and fixed distance between the electrodes of 5 mm, and with a variable flow rate of argon gas (0.5, 1, 1.5, 2 and 2.5) L/min. The emission spectra of the DBD plasmas at different flow rates of argon gas have been recorded. Boltzmann plot method was used to calculate the plasma electron temperature (Te), and Stark broadeni
... Show MoreThe aim of this research is to investigate the skills of the chemistry students from the Ibn Al-Haytham Education college of pure sciences in Baghdad in understanding and constructing graphical representations of data. The research sample consisted of (101) male and female students in their fourth year of study during the 2016-2017 academic year. This sample represents 71% of the total number of students in this group.The research methodology used consisted of two parts relating to 19 issues. The first part is an objective multi choice type of test to measure the student’s skill in selecting the right representation of specific subject graph amongst many provided. The second part concentrated on measuring the student’s skill in construc
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More