Preferred Language
Articles
/
jeasiq-2275
Comparing Some of Robust the Non-Parametric Methods for Semi-Parametric Regression Models Estimation
...Show More Authors

In this research, some robust non-parametric methods were used to estimate the semi-parametric regression model, and then  these methods were compared using the MSE comparison criterion, different sample sizes, levels of variance, pollution rates, and three different models were used. These methods are S-LLS S-Estimation -local smoothing, (M-LLS)M- Estimation -local smoothing, (S-NW) S-Estimation-NadaryaWatson Smoothing, and (M-NW) M-Estimation-Nadarya-Watson Smoothing.

The results in the first model proved that the (S-LLS) method was the best in the case of large sample sizes, and small sample sizes showed that the (M-LLS) method was the best, while the second model showed in general that the S-LLS method was the best in addition to the method M-LLS was the best in some cases of sample sizes and at different levels of variance. As for the third model, it was shown through the results that in most cases the S-LLS method was the best in addition to the M-LLS method which was better in some cases of sample sizes and at different levels of variance.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Some Methodological Notes on Ibn Al-Jezri Book: Ghayat Al-Nihaya (The Aim of the End): Some Methodological Notes on Ibn Al-Jezri Book: Ghayat Al-Nihaya (The Aim of the End)
...Show More Authors

Abstract
Dame Ngaio Edith Marsh (1899-1982), a writer of detective fiction, was born
at Christchurch, New Zealand. Her hero, Chief Detective Inspector Roderick Alleyn,
appears in her first novel, A Man Lay Dead (1934), and in subsequent novels
including Death and the Dancing Footman (1942). She wrote twenty detective novels.
The Dancing Footman, Thomas, listening to a playful song from the smokingroom's
radio where William lay dead after being killed by his brother, Nicholas,
provides the most suspected guest at Highfold with badly needed alibi. The murderer,
Nicholas, plans an almost perfect crime, but the dance of this footman spoils his
scheme. When Alleyn and his group of policemen stage a show in which the

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The use of the methods of the lower squares and the smaller squares weighted in the estimation of the parameters and design of the sample acceptance schemesFor general exponential distribution
...Show More Authors

The acceptance sampling plans for generalized exponential distribution, when life time experiment is truncated at a pre-determined time are provided in this article. The two parameters (α, λ), (Scale parameters and Shape parameters) are estimated by LSE, WLSE and the Best Estimator’s for various samples sizes are used to find the ratio of true mean time to a pre-determined, and are used to find the smallest possible sample size required to ensure the producer’s risks, with a pre-fixed probability (1 - P*). The result of estimations and of sampling plans is provided in tables.

Key words: Generalized Exponential Distribution, Acceptance Sampling Plan, and Consumer’s and Producer Risks

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Applying Cognitive Methodology in Designing On-Line Auto-Tuning Robust PID Controller for the Real Heating System
...Show More Authors

A novel design and implementation of a cognitive methodology for the on-line auto-tuning robust PID controller in a real heating system is presented in this paper. The aim of the proposed work is to construct a cognitive control methodology that gives optimal control signal to the heating system, which achieve the following objectives: fast and precise search efficiency in finding the on- line optimal PID controller parameters in order to find the optimal output temperature response for the heating system. The cognitive methodology (CM) consists of three engines: breeding engine based Routh-Hurwitz criterion stability, search engine based particle
swarm optimization (PSO) and aggregation knowledge engine based cultural algorithm (CA)

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 02 2011
Journal Name
Journal Of Educational And Psychological Researches
The Dominant Values of Universities students in the light of some variables
...Show More Authors

Current research strives to achieve the following aims:

  1. Develop a scale for dominant values of Tikrit university students.
  2. Measuring the dominant of Tikrit university students.
  3. Identifying the significant differences among dominant values of Tikrit university students according to(sex, specialty, time).
  4. Measuring the dominant values of each one of the six fields of the scale.
  5. Identifying the differences in dominant values of each field according to the sex variables.

The current research has limi

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
International Journal On “technical And Physical Problems Of Engineering”
Age Estimation Utilizing Deep Learning Convolutional Neural Network
...Show More Authors

Estimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes

... Show More
Scopus (10)
Scopus
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
Choosing the best method for estimating the survival function of inverse Gompertz distribution by using Integral mean squares error (IMSE)
...Show More Authors

In this research , we study the inverse Gompertz distribution (IG) and estimate the  survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes

View Publication Preview PDF
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Ϣ-Semi-p Open Set :
...Show More Authors

Csaszar introduced the concept of generalized topological space and a new open set in a generalized topological space called -preopen in 2002 and 2005, respectively. Definitions of -preinterior and -preclosuer were given. Successively, several studies have appeared to give many generalizations for an open set. The object of our paper is to give a new type of generalization of an open set in a generalized topological space called -semi-p-open set. We present the definition of this set with its equivalent. We give definitions of -semi-p-interior and -semi-p-closure of a set and discuss their properties. Also the properties of -preinterior and -preclosuer are discussed. In addition, we give a new type of continuous function

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 15 2009
Journal Name
Journal Of Planner And Development
Rapid Urbanization of the Cities Studying in some Iraqi Cities
...Show More Authors

The cities are not yet a temporal status in the process of the human and civilization development. The cities consider as a life pattern, this mean that people cannot live without cities, which surround us. Several phenomena like globalization, revolution of information, technical development, increased of consumption, do not confirmed without the living in cities. The urbanization – in its simple meaning – means transferring from rural community to city community. In other word, it means that socioeconomic changes happened subject to the patterns and conditions of the urban life. Each government depend a certain policy, this policy contains set of plans and programs, that targeting to affect the population factors and the st

... Show More
View Publication Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
 - Semi-Regular Closed Sets
...Show More Authors

   In this paper, a new class of sets, namely - semi-regular closed sets is introduced and studied for topological spaces. This class properly contains the class of semi--closed sets and is property contained in the class of pre-semi-closed sets. Also, we introduce and study srcontinuity and sr-irresoleteness. We showed that sr-continuity falls strictly in between semi-- continuity and pre-semi-continuity.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Technology Reports Of Kansai University
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm

... Show More