In this paper, we will discuss the performance of Bayesian computational approaches for estimating the parameters of a Logistic Regression model. Markov Chain Monte Carlo (MCMC) algorithms was the base estimation procedure. We present two algorithms: Random Walk Metropolis (RWM) and Hamiltonian Monte Carlo (HMC). We also applied these approaches to a real data set.
The development that solar energy will have in the next years needs a reliable estimation of available solar energy resources. Several empirical models have been developed to calculate global solar radiation using various parameters such as extraterrestrial radiation, sunshine hours, albedo, maximum temperature, mean temperature, soil temperature, relative humidity, cloudiness, evaporation, total perceptible water, number of rainy days, and altitude and latitude. In present work i) First part has been calculated solar radiation from the daily values of the hours of sun duration using Angstrom model over the Iraq for at July 2017. The second part has been mapping the distribution of so
The importance of this research is to clarify the nature and the relationship between the indicators of financial policy and banking stability in Iraq, as well as to find a composite index reflects the state of banking stability in Iraq in order to provide an appropriate means to help policymakers in making appropriate decisions before the occurrence of financial crises.
Hence, the problem of research is that the fiscal policy has implications for the macro economy and does not rule out its impact on banking stability. Moreover, the central bank does not possess a single indicator that reflects the stability of the banking system, rather than the scattered indicators that depend o
... Show MoreThe research deals with the lyrical introduction in the commentary of Tarfa bin al-Abd as a formative system characterized by flexibility and richness of imagination, which achieved a formative treatment and a unique construction within the structures of the structural and semantic language. I dealt with the poetic verses represented by the lyrical introduction as a formative hypothesis, basing its goal on a methodological framework distributed on the problem that was summarized by the following question: Is it possible to look at the poetic pattern within the pre-Islamic poem / hanging blinking as a model, in its plastic dimensions and to identify the stylistic treatment that achieves the formation space within the poetic text. The rese
... Show MoreThe modern business environment Witness tremendous.These developments result from globalization of markets and economic and technological openness. Those developments resulting a heightened competition between economic units and higher the costs of their products and lower their functional characteristics. They do not take into account the response to the requirements of customers. This matter commit it to search for scientific methods to help it to cope with the happening changes and improve its competitive position, The current study acquired its importance by providing significance through by applicable integrated framework to reduce the costs of products. This reduction should be without compromising their quality by using the integr
... Show MoreIn the current paper, the effect of fear in three species Beddington–DeAngelis food chain model is investigated. A three species food chain model incorporating Beddington-DeAngelis functional response is proposed, where the growth rate in the first and second level decreases due to existence of predator in the upper level. The existence, uniqueness and boundedness of the solution of the model are studied. All the possible equilibrium points are determined. The local as well as global stability of the system are investigated. The persistence conditions of the system are established. The local bifurcation analysis of the system is carried out. Finally, numerical simulations are used t
Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show MoreRecently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati
... Show MoreThe theory of probabilistic programming may be conceived in several different ways. As a method of programming it analyses the implications of probabilistic variations in the parameter space of linear or nonlinear programming model. The generating mechanism of such probabilistic variations in the economic models may be due to incomplete information about changes in demand, production and technology, specification errors about the econometric relations presumed for different economic agents, uncertainty of various sorts and the consequences of imperfect aggregation or disaggregating of economic variables. In this Research we discuss the probabilistic programming problem when the coefficient bi is random variable
... Show More