Variable selection is an essential and necessary task in the statistical modeling field. Several studies have triedto develop and standardize the process of variable selection, but it isdifficultto do so. The first question a researcher needs to ask himself/herself what are the most significant variables that should be used to describe a given dataset’s response. In thispaper, a new method for variable selection using Gibbs sampler techniqueshas beendeveloped.First, the model is defined, and the posterior distributions for all the parameters are derived.The new variable selection methodis tested usingfour simulation datasets. The new approachiscompared with some existingtechniques: Ordinary Least Squared (OLS), Least Absolute Shrinkage and Selection Operator (Lasso), and Tikhonov Regularization (Ridge). The simulation studiesshow that the performance of our method is better than the othersaccording to the error and the time complexity. Thesemethodsare applied to a real dataset, which is called Rock StrengthDataset.The new approach implemented using the Gibbs sampler is more powerful and effective than other approaches.All the statistical computations conducted for this paper are done using R version 4.0.3 on a single processor computer.
Data <span>transmission in orthogonal frequency division multiplexing (OFDM) system needs source and channel coding, the transmitted data suffers from the bad effect of large peak to average power ratio (PAPR). Source code and channel codes can be joined using different joined codes. Variable length error correcting code (VLEC) is one of these joined codes. VLEC is used in mat lab simulation for image transmission in OFDM system, different VLEC code length is used and compared to find that the PAPR decreased with increasing the code length. Several techniques are used and compared for PAPR reduction. The PAPR of OFDM signal is measured for image coding with VLEC and compared with image coded by Huffman source coding and Bose-
... Show MoreNegotiations are distinguished in that they are an easy and simple means between the conflicting parties, and it is an effective means at the same time as the conflicting parties seek understanding on the most effective way to solve their dispute, but negotiations are not always appropriate to resolve international disputes, especially when there is a disparity in power between the negotiating countries, or when it is missing Goodwill, or even when one of the parties is absent or less flexible, and the internal circumstances of one of the conflicting countries may play a negative or positive role in the success of the negotiations, away from the influence of the role of external variables in that, a
... Show MoreBackground: Decalcification of surface enamel adjacent to fixed orthodontic appliances, in the form of white spot lesions, is a wide spread and familiar well-known side effect of orthodontic treatment. The present study was carried out to evaluate the effect of enamel protective agent (Clinpro white varnish) on shear and tensile bond strength of Dentaurum orthodontic stainless steel brackets by using 3M Unitek and Ormco as orthodontic adhesive agents. Materials and methods: Sixty-four extracted human upper first premolar teeth were selected and randomly divided into two groups with 32 teeth each, representing the shear and tensile bond strength testing groups. Then according to the type of bonding adhesive and the addition of Clinpro before
... Show MoreThis work is devoted to define new generalized gamma and beta functions involving the recently suggested seven-parameter Mittag-Leffler function, followed by a review of all related special cases. In addition, necessary investigations are affirmed for the new generalized beta function, including, Mellin transform, differential formulas, integral representations, and essential summation relations. Furthermore, crucial statistical application has been realized for the new generalized beta function.
Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete
... Show MoreFlow unit and reservoir rock type identification in carbonates are difficult due to the intricacy of pore networks caused by facies changes and diagenetic processes. On the other hand, these classifications of rock type are necessary for understanding a reservoir and predicting its production performance in the face of any activity. The current study focuses on rock type and flow unit classification for the Mishrif reservoir in Iraq's southeast and the study is based on data from five wells that penetrate it. Integration of several methods was used to determine the flow unit based on well log interpretation and petrophysical properties. The flow units were identified using the Quality Index of Rock and the Indicator of Flow Zone. Th
... Show MoreMechanical rock properties are essential to minimize many well problems during drilling and production operations. While these properties are crucial in designing optimum mud weights during drilling operations, they are also necessary to reduce the sanding risk during production operations. This study has been conducted on the Zubair sandstone reservoir, located in the south of Iraq. The primary purpose of this study is to develop a set of empirical correlations that can be used to estimate the mechanical rock properties of sandstone reservoirs. The correlations are established using laboratory (static) measurements and well logging (dynamic) data. The results support the evidence that porosity and sonic travel time are consistent i
... Show MoreIn information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show More This paper introduces a relation between resultant and the Jacobian determinant
by generalizing Sakkalis theorem from two polynomials in two variables to the case of (n) polynomials in (n) variables. This leads us to study the results of the type: , and use this relation to attack the Jacobian problem. The last section shows our contribution to proving the conjecture.