In this study, we investigate about the estimation improvement for Autoregressive model of the third order, by using Levinson-Durbin Recurrence (LDR) and Weighted Least Squares Error ( WLSE ).By generating time series from AR(3) model when the error term for AR(3) is normally and Non normally distributed and when the error term has ARCH(q) model with order q=1,2.We used different samples sizes and the results are obtained by using simulation. In general, we concluded that the estimation improvement for Autoregressive model for both estimation methods (LDR&WLSE), would be by increasing sample size, for all distributions which are considered for the error term , except the lognormal distribution. Also we see that the estimation improvement for WSLE method, depends on the value for the Forgetting Factor parameter (α),which haave value less than one(i.e. 1) ( α< ). The estimate is improved for large value for parameterα exactly at 0.99 α= .Finally, we used the estimation methods (LDR&WLSE) for real data.
Anastatica hierochuntica L. is distributed throughout Arabain Peninsula, and elsewhere it is locally called "Kuffe Maryam" .All parts of the plant are used in folk medicine. This study amid to investigate the effect of aqueous extract of anastatica hierochunctica L. on the cancer cell lines AMN-3. Anti cancer activity of aqueous extract of anastatica hierochunctica L. showed anticancer activity against AMN-3 cell line for twelve concentrations (0.04, 0.09, 0.195, 0.39, 0.78, 1.56, 3.125, 6.25, 12.5, 25, 50, 100) mg/mL in comparison with negative control.
This work includes the synthesis of new ester compounds containing two 1,3,4-oxadiazole rings, 15a-c and 16a-c. This was done over seven steps, starting with p-acetamido-phenol 1 and 2-mercaptobenzoimidazole 2. The structure of the products was determined using FT-IR, 1H NMR, and mass spectroscopy. The evaluation of the antimicrobial activities of some prepared compounds was achieved against four types of bacteria (two types of gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis, and two types of gram-negative bacteria, Pseudomonas aeruginosa and E. Coli), as well as against one types of fungus (C. albino). The results show moderate activit against the study bacteria, and the theoretical analysis of the toxi
... Show MoreUsing sodium4-((4,5-diphenyl-imidazol-2-yl)diazenyl)-3-hydroxynaphthalene-1-sulfonate (SDPIHN) as a chromogenic reagent in presence of non-ionic surfactant (Triton x-100) to estimate the chromium(III) ion if the wavelength of this reagent 463 nm to form a dark greenish-brown complex in wavelength 586 nm at pH=10,the complex was stable for longer than 24 hours. Beer's low, molar absorptivity 0.244×104L.mol-1.cm-1, and Sandal's sensitivity 0.021 µg/cm2 are all observed in the concentration range 1-11 µg/mL. The limits of detection (LOD) and limit of quantification (LOQ), respectively, were 0.117 µg/mL and 0.385µg/mL. (mole ratio technique, job's method) were employed to
... Show MoreThe current research is concerned with methods of formation and their effect on the sintering process of ceramic materials. The research is divided into a number of chapters. The first chapter addressed the research structure (the research problem, importance, objective, limits, and it also defined the terms used in the research). The second chapter addressed the theoretical framework, where the theoretical framework has been divided into three sections. The first section dealt with methods of formation of ceramic materials including: Plasticizing method 2- semi-dry pressing method 3- dry pressing method 4- extrusion method 5- casting method.
The researcher found that there is a clear difference between the methods through her formati
Exponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.
In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us
... Show MoreThe analysis of the classic principal components are sensitive to the outliers where they are calculated from the characteristic values and characteristic vectors of correlation matrix or variance Non-Robust, which yields an incorrect results in the case of these data contains the outliers values. In order to treat this problem, we resort to use the robust methods where there are many robust methods Will be touched to some of them.
The robust measurement estimators include the measurement of direct robust estimators for characteristic values by using characteristic vectors without relying on robust estimators for the variance and covariance matrices. Also the analysis of the princ
... Show MoreMany problems are facing the installation of piles group in laboratory testing and the errors in results of load and settlement are measured experimentally may be happened due to select inadequate method of installation of piles group. There are three main methods of installation in-flight, pre-jacking and hammering methods. In order to find the correction factor between these methods the laboratory model tests were conducted on small-scale models. The parameters studied were the methods of installation (in-flight, pre-jacking and hammering method), the number of piles and in sandy soil in loose state. The results of experimental work show that the increase in the number of piles value led to increase in load carrying ca
... Show MoreWith the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreOne of the main causes for concern is the widespread presence of pharmaceuticals in the environment, which may be harmful to living things. They are often referred to as emerging chemical pollutants in water bodies because they are either still unregulated or undergoing regulation. Pharmaceutical pollution of the environment may have detrimental effects on ecosystem viability, human health, and water quality. In this study, the amount of remaining pharmaceutical compounds in environmental waters was determined using a straightforward review. Pharmaceutical production and consumption have increased due to medical advancements, leading to concerns about their environmental impact and potential harm to living things due to their increa
... Show More