This paper deals to how to estimate points non measured spatial data when the number of its terms (sample spatial) a few, that are not preferred for the estimation process, because we also know that whenever if the data is large, the estimation results of the points non measured to be better and thus the variance estimate less, so the idea of this paper is how to take advantage of the data other secondary (auxiliary), which have a strong correlation with the primary data (basic) to be estimated single points of non-measured, as well as measuring the variance estimate, has been the use of technique Co-kriging in this field to build predictions spatial estimation process, and then we applied this idea to real data in the cultivation of wheat crop in Iraq, where he was be considered the amount of production is the basic data (variable primary) and want to estimate a single points of non measured and the cultivated area (variable secondary) has been programming all calculations language Matlab
Discriminant analysis is a technique used to distinguish and classification an individual to a group among a number of groups based on a linear combination of a set of relevant variables know discriminant function. In this research discriminant analysis used to analysis data from repeated measurements design. We will deal with the problem of discrimination and classification in the case of two groups by assuming the Compound Symmetry covariance structure under the assumption of normality for univariate repeated measures data.
... Show More
Equation Boizil used to Oatae approximate value of bladder pressure for 25 healthy people compared with Amqas the Alrotinahh ways used an indirect the catheter Bashaddam and found this method is cheap and harmless and easy
The reliability of hybrid systems is important in modern technology, specifically in engineering and industrial fields; it is an indicator of the machine's efficiency and ability to operate without interruption for an extended period of time. It also allows for the evaluation of machines and equipment for planning and future development. This study looked at reliability of hybrid (parallel series) systems with asymmetric components using exponential and Pareto distributions. Several simulation experiments were performed to estimate the reliability function of these systems using the Maximum Likelihood method and the Standard Bayes method with a quadratic loss (QL) function and two priors: non-informative (Jeffery) and inform
... Show MorePorosity and permeability are the most difficult properties to determine in subsurface reservoir characterization. The difficulty of estimating them arising from the fact that porosity and permeability may vary significantly over the reservoir volume, and can only be sampled at well location. Secondly, the porosity values are commonly evaluated from the well log data, which are usually available from most wells in the reservoir, but permeability values, which are generally determined from core analysis, are not usually available. The aim of this study is: First, to develop correlations between the core and the well log data which can be used to estimate permeability in uncored wells, these correlations enable to estimate reservoir permeabil
... Show MoreA new approach presented in this study to determine the optimal edge detection threshold value. This approach is base on extracting small homogenous blocks from unequal mean targets. Then, from these blocks we generate small image with known edges (edges represent the lines between the contacted blocks). So, these simulated edges can be assumed as true edges .The true simulated edges, compared with the detected edges in the small generated image is done by using different thresholding values. The comparison based on computing mean square errors between the simulated edge image and the produced edge image from edge detector methods. The mean square error computed for the total edge image (Er), for edge regio
... Show MoreEstimating an individual's age from a photograph of their face is critical in many applications, including intelligence and defense, border security and human-machine interaction, as well as soft biometric recognition. There has been recent progress in this discipline that focuses on the idea of deep learning. These solutions need the creation and training of deep neural networks for the sole purpose of resolving this issue. In addition, pre-trained deep neural networks are utilized in the research process for the purpose of facial recognition and fine-tuning for accurate outcomes. The purpose of this study was to offer a method for estimating human ages from the frontal view of the face in a manner that is as accurate as possible and takes
... Show MoreThe estimation of the amounts of Surface runoff resulting from rainfall in the water basins is of great importance in water resources management. The study area (Bahr Al-Najaf) is located on the western edge of the plateau and the southwestern part of the city center of Najaf, with an area of 2729.4 (km2). The soil and water assessment tool (SWAT) with ArcGIS software was used to simulate the runoff coming from the three main valleys (Kharr (A and B)), Shoaib Al-Rahimawi, and Maleh), that contribute the flow to the study area. The results of the model showed that the SWAT software was successfully simulating the flow conditions based on the coefficient of determination (R2), the Nash coefficient (NS
... Show MoreThis paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreAnomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show More