Preferred Language
Articles
/
2xhpgZUBVTCNdQwCBy56
Inferential Methods for the Dagum Regression Model
...Show More Authors

The Dagum Regression Model, introduced to address limitations in traditional econometric models, provides enhanced flexibility for analyzing data characterized by heavy tails and asymmetry, which is common in income and wealth distributions. This paper develops and applies the Dagum model, demonstrating its advantages over other distributions such as the Log-Normal and Gamma distributions. The model's parameters are estimated using Maximum Likelihood Estimation (MLE) and the Method of Moments (MoM). A simulation study evaluates both methods' performance across various sample sizes, showing that MoM tends to offer more robust and precise estimates, particularly in small samples. These findings provide valuable insights into the analysis of income inequality and wealth distribution using the Dagum model.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
Particle-Hole State Density Calculations with Non-Equidistant Spacing Model: I. Basic Derivation
...Show More Authors

The basic analytical formula for particle-hole state densities is derived based on the non-Equidistant Spacing Model (non-ESM) for the single-particle level density (s.p.l.d.) dependence on particle excitation energy u. Two methods are illustrated in this work, the first depends on Taylor series expansion of the s.p.l.d. about u, while the second uses direct analytical derivation of the state density formula. This treatment is applied for a system composing from one kind of fermions and for uncorrected physical system. The important corrections due to Pauli blocking was added to the present formula. Analytical comparisons with the standard formulae for ESM are made and it is shown that the solution reduces to earlier formulae providing m

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Civil Engineering Journal
Calibration of a New Concrete Damage Plasticity Theoretical Model Based on Experimental Parameters
...Show More Authors

The introduction of concrete damage plasticity material models has significantly improved the accuracy with which the concrete structural elements can be predicted in terms of their structural response. Research into this method's accuracy in analyzing complex concrete forms has been limited. A damage model combined with a plasticity model, based on continuum damage mechanics, is recommended for effectively predicting and simulating concrete behaviour. The damage parameters, such as compressive and tensile damages, can be defined to simulate concrete behavior in a damaged-plasticity model accurately. This research aims to propose an analytical model for assessing concrete compressive damage based on stiffness deterioration. The prop

... Show More
Scopus (27)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Jan 24 2016
Journal Name
Al-academy
Shift formal regulations on Mesopotamian pottery (Pottery Samarra model): محمد جاسم محمد العبيدي
...Show More Authors

Operated Alandziahih "drift theory" as a science talk in most of the cash and technical studies in the early twentieth century, making him and the sciences, arts and culture both fields of experiences, in an attempt to explore the institutions that theory, a number of laws which took control in the internal structures of those acts, resulting in for those institutions to be actively contribute their ideas to guide the pace on the right track. And thus lay the foundations of this theory, which was a big affair in the early twentieth century and still vigorous pace to this day, particularly their applications in various fields of the arts.Although each type of Arts, both in the composition or the theater or means of communication, took joi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 04 2010
Journal Name
Journal Of Educational And Psychological Researches
guidance program Structured to address therapeutic cognitive emotional disorders (Anxiety and depression model)
...Show More Authors

           Is one of the processes of educational guidance to help the individual to design educational plans that fit with the abilities and inclinations and goals.
And research aims the current instruction program heuristic therapeutic knowledge to deal with emotional disorders. And may the researcher instruct a program according to the theories of interested and competent guidance to education and has studied the large number of studies available in this field, as has been the program on a number of specialists in education and Psychology and took their views. And then was adopted the final version of the indicative program, consistent with the sample, which was built

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 03 2020
Journal Name
Journal Of Applied Mathematics
Order and Chaos in a Prey-Predator Model Incorporating Refuge, Disease, and Harvesting
...Show More Authors

In this paper, a mathematical model consisting of a prey-predator system incorporating infectious disease in the prey has been proposed and analyzed. It is assumed that the predator preys upon the nonrefugees prey only according to the modified Holling type-II functional response. There is a harvesting process from the predator. The existence and uniqueness of the solution in addition to their bounded are discussed. The stability analysis of the model around all possible equilibrium points is investigated. The persistence conditions of the system are established. Local bifurcation analysis in view of the Sotomayor theorem is carried out. Numerical simulation has been applied to investigate the global dynamics and specify the effect

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Journal Of Sensors
A Modern Approach towards an Industry 4.0 Model: From Driving Technologies to Management
...Show More Authors

Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are currently in the midst of the fourth such revolution, coined Industry 4.0 by the World Economic Forum. Building on their guideline set of technologies that encompass Industry 4.0, we present a full set of pillar technologies on which Industry 4.0 project portfolio management rests as well as the foundation technologies that support these pillars. A complete model of an Industry 4.0 factory which relies on these pillar technologies is presented. The full set of pillars encompasses cyberph

... Show More
View Publication
Scopus (101)
Crossref (89)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Assessing the efficiency Economic performance of the diyala General company for electrical industries for the Period (2000-2010)
...Show More Authors


     Facing industrial companies many pressures and challenges due to rapid changes in the business environment of contemporary, which requires them to do their performance look more inclusive rather than limiting performance evaluation on the financial perspective in spite of its importance, prompting companies to rethink their reality competitive through the adoption of methodologies and new philosophies to manage competitiveness of total quality management, and re-engineering of production processes, and knowledge management,... etc., as This study framework cognitive and practical "to evaluate the performance of a company Diyala General Electric Industries and how to rehabilitate

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Two of (Turnbull) and (Generalization Turnbulls)non-parametric methods in estimating conditional survival function (applied study on breast cancer patients)
...Show More Authors

   This research includes the application of non-parametric methods in estimating the conditional survival function represented in a method (Turnbull) and (Generalization Turnbull's) using data for Interval censored of breast cancer and two types of treatment, Chemotherapy and radiation therapy and age is continuous variable, The algorithm of estimators was applied through using (MATLAB) and then the use average Mean Square Error (MSE) as amusement  to the estimates and the results showed (generalization of Turnbull's) In estimating the conditional survival function and for both treatments ,The estimated survival of the patients does not show very large differences

... Show More
View Publication Preview PDF
Crossref