يقترح هذا البحث طريقة جديدة لتقدير دالة كثافة الرابطة باستخدام تحليل المويجات كطريقة لامعلمية، من أجل الحصول على نتائج أكثر دقة وخالية من مشكلة تاثيرات الحدود التي تعاني منها طرائق التقدير اللامعلمية. اذ تعد طريقة المويجات طريقة اوتماتيكية للتعامل مع تاثيرات الحدود وذلك لانها لا تأخذ بنظر الاعتبار إذا كانت السلسلة الزمنية مستقرة او غير مستقرة. ولتقدير دالة كثافة الرابطة تم استعمال المحاكاة لتوليد البيانات وباستعمال خمسة دوال رابطة مختلفة مثل Gaussian وFrank وTawn وRotation Tawn وJoe وبخمسة أحجام مختلفة للعينات عند ثلاثة مستويات ارتباط موجبة، واعتمادًا على الحلول المتعددة، أظهرت النتائج أن تقدير دالة الكثافة الرابطة بطريقة المويجات عندما يكون مستوى الارتباط كانت الرابطة Gaussian في المرتبة الأولى تليها الرابطةFrank واحتلت الرابطة Joe المرتبة الأخيرة. اما في حالة الارتباطات المتوسطة والضعيفة كانت الرابطة Tawn في المرتبة الأولى تليها الرابطة Rotation Tawn في حين جاءت Gaussian بالمرتبة الأخيرة. بالاعتماد على المعايير (Root Mean Square Error, Akiake Information Criteria, and Logarithm likelihood criteria) ، وتبين من خلال الرسم (Contour plot) والشكل ثلاثي الابعاد (3D plot) لدوال الرابطة الحقيقية. فضلا عن اشكال التمهيد لكل منها باستخدام طريقة (ECDWT)، ويتضح من خلال الاشكال الدائرية ان توزيع مشاهدات الدالة الرابطة المقدرة بطريقة (ECDWT) كان دقيقا عند الاطراف بينما كان اقل دقة عند المركز لكل من الدوال Gaussian وTawn.
The incidence of disease and damage will increase, if environmental control and acceptable management practices are not provided during the rearing period. Ascites affect young broilers with rapid growth, and the most critical factor in causing ascites syndrome is the lack of oxygen in body tissues (hypoxia). This research aimed to investigate the effect of olive leaves hydroalcoholic extract and probiotics (LactoFeed) on experimental ascites caused by levothyroxine in male broiler chickens. The present study was an interventional type, and for its implementation, a single-factor design was used in eight groups with 3 replicates. Data were analyzed based on a one-way analysis of variance. Blood parameters of male chick
... Show MoreA simple, environmental friendly and selective sample preparation technique employing porous membrane protected micro-solid phase extraction (μ-SPE) loaded with molecularly imprinted polymer (MIP) for the determination of ochratoxin A (OTA) is described. After the extraction, the analyte was desorbed using ultrasonication and was analyzed using high performance liquid chromatography. Under the optimized conditions, the detection limits of OTA for coffee, grape juice and urine were 0.06 ng g−1, 0.02 and 0.02 ng mL−1, respectively while the quantification limits were 0.19 ng g−1, 0.06 and 0.08 ng mL−1, respectively. The recoveries of OTA from coffee spiked at 1, 25 and 50 ng g−1, grape juice and urine samples at 1, 25 and 50 ng mL
... Show MoreA chemometric method, partial least squares regression (PLS) was applied for the simultaneous determination of piroxicam (PIR), naproxen (NAP), diclofenac sodium (DIC), and mefenamic acid (MEF) in synthetic mixtures and commercial formulations. The proposed method is based on the use of spectrophotometric data coupled with PLS multivariate calibration. The Spectra of drugs were recorded at concentrations in the linear range of 1.0 - 10 μg mL-1 for NAP and from 1.0 - 20 μg mL-1 for PIR, DIC, and MEF. 34 sets of mixtures were used for calibration and 10 sets of mixtures were used for validation in the wavelength range of 200 to 400 nm with the wavelength interval λ = 1 nm in methanol. This method has been used successfully to quant
... Show MoreSoftware-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne
... Show More