The purpose of this paper is to model and forecast the white oil during the period (2012-2019) using volatility GARCH-class. After showing that squared returns of white oil have a significant long memory in the volatility, the return series based on fractional GARCH models are estimated and forecasted for the mean and volatility by quasi maximum likelihood QML as a traditional method. While the competition includes machine learning approaches using Support Vector Regression (SVR). Results showed that the best appropriate model among many other models to forecast the volatility, depending on the lowest value of Akaike information criterion and Schwartz information criterion, also the parameters must be significant. In addition, the residuals don’t have the serial correlation and ARCH effect, as well as these models, should have a higher value of log-likelihood and SVR-FIGARCH models managed to outperform FIGARCH models with normal and student’s t distributions. The SVR-FIGARCH model exhibited statistical significance and improved accuracy obtained with the SVM technique. Finally, we evaluate the forecasting performance of the various volatility models, and then we choose the best fitting model to forecast the volatility for each series, depending on three forecasting accuracy measures RMSE, MAE, and MAPE.
The purpose of this research is to find the estimator of the average proportion of defectives based on attribute samples. That have been curtailed either with rejection of a lot finding the kth defective or with acceptance on finding the kth non defective.
The MLE (Maximum likelihood estimator) is derived. And also the ASN in Single Curtailed Sampling has been derived and we obtain a simplified Formula All the Notations needed are explained.
This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b
... Show MoreThis research deals with the attitude of oil press towards oil industry in the world and the extent of their concerns with the stages of oil industry relating to the abundance of oil and natural gas, as it is an international strategic and complementary industry. The researcher uses the survey method for content analysis of the initial article and the press news for two: years (2011-2012). The results if the study are as follows
1- Oil press is concerned with developing and the stages of the Arabic oil industry in the interest of OAPEC in the first place.
2- It is concerned with exploring, extracting, and marketing oil in the first place, then with refining operations in refineries and petrochemical plants in the second place, an
Project management are still depending on manual exchange of information based on paper documents. Where design drawings drafting by computer-aided design (CAD), but the data needed by project management software can not be extracted directly from CAD, and must be manually entered by the user. The process of calculation and collection of information from drawings and enter in the project management software needs effort and time with the possibility of errors in the transfer and enter of information. This research presents an integrated computer system for building projects where the extraction and import quantities, through the interpretation of AutoCAD drawing with MS Access database of unit costs and productivities for the pricing and
... Show MoreNasryia oil field is located about 38 Km to the north-west of Nasryia city. The field was discovered in 1975 after doing seismic by Iraqi national oil company. Mishrif formation is a carbonate rock (Limestone and Dolomite) and its thickness reach to 170m. The main reservoir is the lower Mishrif (MB) layer which has medium permeability (3.5-100) md and good porosity (10-25) %. Form well logging interpretation, it has been confirmed the rock type of Mishrif formation as carbonate rock. A ten meter shale layer is separating the MA from MB layer. Environmental corrections had been applied on well logs to use the corrected one in the analysis. The combination of Neutron-Density porosity has been chosen for interpretation as it is c
... Show MoreInformation systems and data exchange between government institutions are growing rapidly around the world, and with it, the threats to information within government departments are growing. In recent years, research into the development and construction of secure information systems in government institutions seems to be very effective. Based on information system principles, this study proposes a model for providing and evaluating security for all of the departments of government institutions. The requirements of any information system begin with the organization's surroundings and objectives. Most prior techniques did not take into account the organizational component on which the information system runs, despite the relevance of
... Show MoreCloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of
... Show MoreThe deployment of UAVs is one of the key challenges in UAV-based communications while using UAVs for IoT applications. In this article, a new scheme for energy efficient data collection with a deadline time for the Internet of things (IoT) using the Unmanned Aerial Vehicles (UAV) is presented. We provided a new data collection method, which was set to collect IoT node data by providing an efficient deployment and mobility of multiple UAV, used to collect data from ground internet of things devices in a given deadline time. In the proposed method, data collection was done with minimum energy consumption of IoTs as well as UAVs. In order to find an optimal solution to this problem, we will first provide a mixed integer linear programming m
... Show More