This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squares method (FGLS) and the mean group method (MG) were used, and then the efficiency of the extracted estimators was compared in the case of mixed random parameters and the method that gives us the efficient estimator was chosen. Real data was applied that included the per capita consumption of electric energy (Y) for five countries, which represents the number of cross-sections (N = 5) over nine years (T = 9), so the number of observations is (n = 45) observations, and the explanatory variables are the consumer price index (X1) and the per capita GDP (X2). To evaluate the performance of the estimators of the (FGLS) method and the (MG) method on the general model, the mean absolute percentage error (MAPE) scale was used to compare the efficiency of the estimators. The results showed that the mean group estimation (MG) method is the best method for parameter estimation than the (FGLS) method. Also, the (MG) appeared to be the best and best method for estimating sub-parameters for each cross-section (country).
Computer modeling has been used to investing the Coulomb coupling parameter ?. The effects of the structure parameter K, grain charge Z, plasma density N, temperature dust grain Td, on the Coulomb coupling parameter had been studied. It was seen that the ? was increasing with increasing Z and N, and decrease with increasing K and T. Also the critical value of ? that the phase transfer of the plasma state from liquid to solid was studied.
This study aims to know the relationship between the birth order and lifestyles among a sample of adolescent students. The sample of the study consisted of (200) students selected from the governmental schools in the Directorate of Education of Qabatiya, in the second semester of the academic year 2020/2021. The results of the study have revealed that the most common lifestyles among the sample of the study are represented by: (the belonging) style, (the submissive) style, (the avenger) style, (the pampered) style, respectively. The study has also found that there are statistically significant differences in the lifestyles of: (the victim, the domineering, the avenger, and the harmful) which are ascribed to the gender variable. Mor
... Show MoreThe morphometric parameters of Acinopus (Acinopus) laevigatus Ménétriés, 1832 (Coleoptera, Carabidae) were studied and their altitudinal variability was assessed. The length of head is the most variable, and the smallest value of the coefficient of variation is observed for the width of elytra. The length of body parts (head, pronotum, elytra) were more variable compared to their width. The correlation relationship between the morphometric parameters of different parts of the body was analyzed. A high correlation was found between the elytra length (EL) and the total body length (BL) (r=0.93), and the lowest correlation was found between the elytra width (EW) and the pronotum length (PL) (r=0.57). According to all measurement indicato
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
The splicing design of the existing road and the new road in the expansion project is an important part of the design work. Based on the analysis of the characteristics and the load effect of pavement structure on splicing, this paper points out that tensile crack or shear failure may occur at the splicing under the repeated action of the traffic load on the new/old pavement. According to the current structure design code of asphalt pavement in China, it is proposed that the horizontal tensile stress at the bottom of the splicing layer and the vertical shear stress at other layers of the splicing line should be controlled by adjusting the position and size of the excavated steps in addition to the conventional design ind
... Show MoreBackground: The antimicrobial resistance is one of the most serious and expanding health problems world -wide in the last decades. The esbl escherichia coli. (extended – spectrum beta-lactamase e.coli) represents an important aspect of it .Objectives: To get an overview on the esbl e.coli prevalence profile in general. Also to assess the antibiotic sensitivity of esbl e. coli trying to specify the most effective antibiotics in combating this micro-organism.Methods: this study tries to focus on this problem in Iraq which through a prospective study approach by taking 35 clinical samples from various sources (urine, blood, abscess, eye ,vagina ,stool and others),and after confirming the presence of e.coli, the presence of esbl e.coli and
... Show MoreThis study aims to find out the effectiveness of instructional scaffolding strategy in the development of academic achievement and critical thinking of female second grade secondary mathematics students. Semi-experimental and relational descriptive method was used. The sample of the study consisted of (50) students divided into an experimental group and a control group. The experimental group was taught using scaffolding strategy whereas the control group was taught using traditional method. Pre- and Post-tests were used to achieve the objective of the study. The results of the study revealed that there are statistically significant differences in the mean scores of the experimental and control groups in the posttest for both the academi
... Show MoreThe main aim of this research paper is investigating the effectiveness and validity of Meso-Scale Approach (MSA) as a modern technique for the modeling of plain concrete beams. Simply supported plain concrete beam was subjected to two-point loading to detect the response in flexural. Experimentally, a concrete mix was designed and prepared to produce three similar standard concrete prisms for flexural testing. The coarse aggregate used in this mix was crushed aggregate. Numerical Finite Element Analysis (FEA) was conducted on the same concrete beam using the meso-scale modeling. The numerical model was constructed to be a bi-phasic material consisting of cement mortar and coarse aggregate. The interface between the two c
... Show MoreIn this work, studying the effect of ethylenediamine as a corrosion inhibitor was investigated for carbon steel in aerated HCl solution in range of 0.1-1N under dynamic conditions, i.e., rotational velocity of 400–1200 rpm in the temperature range 35 – 65 ºC. Weight loss method was employed in absence and presence of the inhibitor as an adsorption type in concentration range 1000 – 5000 ppm using rotating cylinder specimens. The experimental results showed that corrosion rate in absence and presence of inhibitor is increased with increasing temperature, rotational velocity and concentration of acid. It is decreased with increasing inhibitor concentration for the whole range of temperature, rotational velocity and concentrati
... Show MoreThe limitations of wireless sensor nodes are power, computational capabilities, and memory. This paper suggests a method to reduce the power consumption by a sensor node. This work is based on the analogy of the routing problem to distribute an electrical field in a physical media with a given density of charges. From this analogy a set of partial differential equations (Poisson's equation) is obtained. A finite difference method is utilized to solve this set numerically. Then a parallel implementation is presented. The parallel implementation is based on domain decomposition, where the original calculation domain is decomposed into several blocks, each of which given to a processing element. All nodes then execute computations in parall
... Show More