This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squares method (FGLS) and the mean group method (MG) were used, and then the efficiency of the extracted estimators was compared in the case of mixed random parameters and the method that gives us the efficient estimator was chosen. Real data was applied that included the per capita consumption of electric energy (Y) for five countries, which represents the number of cross-sections (N = 5) over nine years (T = 9), so the number of observations is (n = 45) observations, and the explanatory variables are the consumer price index (X1) and the per capita GDP (X2). To evaluate the performance of the estimators of the (FGLS) method and the (MG) method on the general model, the mean absolute percentage error (MAPE) scale was used to compare the efficiency of the estimators. The results showed that the mean group estimation (MG) method is the best method for parameter estimation than the (FGLS) method. Also, the (MG) appeared to be the best and best method for estimating sub-parameters for each cross-section (country).
A mathematical model constructed to study the combined effects of the concentration and the thermodiffusion on the nanoparticles of a Jeffrey fluid with a magnetic field effect the process of containing waves in a three-dimensional rectangular porous medium canal. Using the HPM to solve the nonlinear and coupled partial differential equations. Numerical results were obtained for temperature distribution, nanoparticles concentration, velocity, pressure rise, pressure gradient, friction force and stream function. Through the graphs, it was found that the velocity of fluid rises with the increase of a mean rate of volume flow and a magnetic parameter, while the velocity goes down with the increasing a Darcy number and lateral walls. Also, t
... Show MoreBecause the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat
... Show MoreTeen-Computer Interaction (TeenCI) stands in an infant phase and emerging in positive path. Compared to Human-Computer Interaction (generally dedicated to adult) and Child-Computer Interaction, TeenCI gets less interest in terms of research efforts and publications. This has revealed extensive prospects for researchers to explore and contribute in the region of computer design and evaluation for teen, in specific. As a subclass of HCI and a complementary for CCI, TeenCI that tolerates teen group, should be taken significant concern in the sense of its context, nature, development, characteristics and architecture. This paper tends to discover teen’s emotion contribution as the first attempt towards building a conceptual model for TeenC
... Show MoreToday, problems of spatial data integration have been further complicated by the rapid development in communication technologies and the increasing amount of available data sources on the World Wide Web. Thus, web-based geospatial data sources can be managed by different communities and the data themselves can vary in respect to quality, coverage, and purpose. Integrating such multiple geospatial datasets remains a challenge for geospatial data consumers. This paper concentrates on the integration of geometric and classification schemes for official data, such as Ordnance Survey (OS) national mapping data, with volunteered geographic information (VGI) data, such as the data derived from the OpenStreetMap (OSM) project. Useful descriptions o
... Show MoreThe Multiple Signal Classification (MUSIC) algorithm is the most popular algorithm to estimate the Angle of Arrival (AOA) of the received signals. The analysis of this algorithm (MUSIC) with typical array antenna element ( ) shows that there are two false direction indication in the plan
aligned with the axis of the array. In this paper a suggested modification on array system is proposed by using two perpendiculars crossed dipole array antenna in spite of one array antenna. The suggested modification does not affect the AOA estimation algorithm. The simulation and results shows that the proposed solution overcomes the MUSIC problem without any effect on the performance of the system.
Secure data communication across networks is always threatened with intrusion and abuse. Network Intrusion Detection System (IDS) is a valuable tool for in-depth defense of computer networks. Most research and applications in the field of intrusion detection systems was built based on analysing the several datasets that contain the attacks types using the classification of batch learning machine. The present study presents the intrusion detection system based on Data Stream Classification. Several data stream algorithms were applied on CICIDS2017 datasets which contain several new types of attacks. The results were evaluated to choose the best algorithm that satisfies high accuracy and low computation time.
Developed and underdevelopment countries, on equal terms, face the problem of budget deficiency. Budget deficiency means that the public expenditure surpasses the public revenues. This, on the international level, is one of the most serious economic problems with many direct effects on the national economy, and depends, basically, on its finance chosen method. Looking for a solution to this problem, for this reason and many other ones, has been highlighted in spite of the many attempts to reduce the role of the governmental expenditure. Budget deficiency can not be attributed to a single unique cause since it is complex phenomenons the causes of which are related to many factors contribute to its occurrence, some of which refer t
... Show MoreIn this study, a new theoretical method for the estimation of absorption and fluorescence spectra is accomplished. These estimations were established following experimental measurements of absorption and fluorescence spectra for the solutions of fluorescein laser dye mixed with titanium dioxide (TiO2) nanoparticles
in distilled water. The used concentration of fluorescein dye was 1x10-5 M, whereas the masses of titanium dioxide nanoparticles were 0.0003g, 0.0005g, 0.001g and 0.002g. An absorption spectra improvement was observed upon raising the mass of TiO2 nanoparticles, which specifies that doping the fluorescein dye with TiO2 nanoparticles have an essential influence on the dye absorption spectra. On the other side, all fluorescen
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.