فًي التحلٌيل اإلحصائ،ً حٌث تعتبر طرٌمة انحدار شرائح تلعب تمنٌات تحلٌل االنحدار الالمعلمً دوراً مركزٌاً لتمهٌد البٌانات، اذ ٌمكن من خاللها تمدٌر الدوال مباشرة من الجزاء واحدة من أكثر الطرائك المستعملة حالٌاً ( بدالً ة البٌانات الصاخبة)التً تحتوي على أخطاء( أو الملوثة )data noisy من االعتماد على نماذج معلمٌ محددة، وتعتمد طرٌمة التمدٌر المستعملة لمالئمه نموذج انحدار شرائح الجزاء فً الغالب على طرائك المربعات الصغرى )OLS)، والتً من المعروف أنها حساسة للمشاهدات غٌر النمطٌة )المتطرفة(، فً هذا البحث سٌتم تمدٌر نماذج انحدار شرائح الجزاء )spline-P )المضافة المعممة باستعمال طرٌمة فصل المصفوفات الدلٌمة المتداخلة )SOP )الممترحة من لبل الباحث )Rodríguez)، واخرون فً عام ،2015 والتً تأخذ المشاهدات المتطرفة فً االعتبار، حٌث ٌعتمد التمدٌر على التكافؤ بٌن )spline-P )والنماذج المختلطة الخطٌة، وٌتم تمدٌر معلمات التباٌن ومعلمات التمهٌد بنا ًء على طرٌمة اإلمكان االعظم الممٌد )REML). ومن اهم االستنتاجات التً تم التوصل الٌها عدم الحاجة الى استعمال طرائك التحسٌن العددي، كما ٌمكن دمج طرٌمة )SOP )بسهولة فً تمدٌر النماذج المختلطة المضافة المعممة )GAMM )مع مجموعات التأثٌرات العشوائٌة المستملة، فضالً عن سرعة تطبٌك طرٌمة )SOP )فً تنفٌذ العملٌات الحسابٌة.
The research risk of flooding on six water basins located in the eastern part of the western plateau, reached total area of the basin (22,998.9 km 2), has reached all the Basin area (basin to time 7056.1 km2 basin by 3585 km 2, Bath Alheiazi 6404 km 2, Abu beasts 544.1 km2 basin Abu Shannan 144.6 km 2, Bath Valley Faraj 5265.1 km 2), where it was specifically spatial degree of this risk by studying some of the hydrological basin transactions directly related to operations spate runoff study area and the occurrence of flood risks on the surface of ponds.
The useful of remote sensing techniques in Environmental Engineering and another science is to save time, Coast and efforts, also to collect more accurate information under monitoring mechanism. In this research a number of statistical models were used for determining the best relationships between each water quality parameter and the mean reflectance values generated for different channels of radiometer operate simulated to the thematic Mappar satellite image. Among these models are the regression models which enable us to as certain and utilize a relation between a variable of interest. Called a dependent variable; and one or more independent variables
Exponential distribution is one of most common distributions in studies and scientific researches with wide application in the fields of reliability, engineering and in analyzing survival function therefore the researcher has carried on extended studies in the characteristics of this distribution.
In this research, estimation of survival function for truncated exponential distribution in the maximum likelihood methods and Bayes first and second method, least square method and Jackknife dependent in the first place on the maximum likelihood method, then on Bayes first method then comparing then using simulation, thus to accomplish this task, different size samples have been adopted by the searcher us
... Show MoreThis paper presents a statistical study for a suitable distribution of rainfall in the provinces of Iraq
Using two types of distributions for the period (2005-2015). The researcher suggested log normal distribution, Mixed exponential distribution of each rovince were tested with the distributions to determine the optimal distribution of rainfall in Iraq. The distribution will be selected on the basis of minimum standards produced some goodness of fit tests, which are to determine
Akaike (CAIC), Bayesian Akaike (BIC), Akaike (AIC). It has been applied to distributions to find the right distribution of the data of rainfall in the provinces of Iraq was used (maximu
... Show MoreIn some cases, researchers need to know the causal effect of the treatment in order to know the extent of the effect of the treatment on the sample in order to continue to give the treatment or stop the treatment because it is of no use. The local weighted least squares method was used to estimate the parameters of the fuzzy regression discontinuous model, and the local polynomial method was used to estimate the bandwidth. Data were generated with sample sizes (75,100,125,150 ) in repetition 1000. An experiment was conducted at the Innovation Institute for remedial lessons in 2021 for 72 students participating in the institute and data collection. Those who used the treatment had an increase in their score after
... Show MoreIn this research, the one of the most important model and widely used in many and applications is linear mixed model, which widely used to analysis the longitudinal data that characterized by the repeated measures form .where estimating linear mixed model by using two methods (parametric and nonparametric) and used to estimate the conditional mean and marginal mean in linear mixed model ,A comparison between number of models is made to get the best model that will represent the mean wind speed in Iraq.The application is concerned with 8 meteorological stations in Iraq that we selected randomly and then we take a monthly data about wind speed over ten years Then average it over each month in corresponding year, so we g
... Show MoreMany objective optimizations (MaOO) algorithms that intends to solve problems with many objectives (MaOP) (i.e., the problem with more than three objectives) are widely used in various areas such as industrial manufacturing, transportation, sustainability, and even in the medical sector. Various approaches of MaOO algorithms are available and employed to handle different MaOP cases. In contrast, the performance of the MaOO algorithms assesses based on the balance between the convergence and diversity of the non-dominated solutions measured using different evaluation criteria of the quality performance indicators. Although many evaluation criteria are available, yet most of the evaluation and benchmarking of the MaOO with state-of-art a
... Show MoreSteganography is defined as hiding confidential information in some other chosen media without leaving any clear evidence of changing the media's features. Most traditional hiding methods hide the message directly in the covered media like (text, image, audio, and video). Some hiding techniques leave a negative effect on the cover image, so sometimes the change in the carrier medium can be detected by human and machine. The purpose of suggesting hiding information is to make this change undetectable. The current research focuses on using complex method to prevent the detection of hiding information by human and machine based on spiral search method, the Structural Similarity Index Metrics measures are used to get the accuracy and quality
... Show MoreIn this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q, this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo
... Show More
XML is being incorporated into the foundation of E-business data applications. This paper addresses the problem of the freeform information that stored in any organization and how XML with using this new approach will make the operation of the search very efficient and time consuming. This paper introduces new solution and methodology that has been developed to capture and manage such unstructured freeform information (multi information) depending on the use of XML schema technologies, neural network idea and object oriented relational database, in order to provide a practical solution for efficiently management multi freeform information system.