Preferred Language
Articles
/
4BeGd48BVTCNdQwCbXhN
Using Different Methods to Estimate the Parameters of Probability Death Density Function with Application
...Show More Authors

In this paper, the maximum likelihood estimates for parameter ( ) of two parameter's Weibull are studied, as well as white estimators and (Bain & Antle) estimators, also Bayes estimator for scale parameter ( ), the simulation procedures are used to find the estimators and comparing between them using MSE. Also the application is done on the data for 20 patients suffering from a headache disease.

Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Methods for Estimating Nonparametric Binary Logistic Regression
...Show More Authors

In this research, the methods of Kernel estimator (nonparametric density estimator) were relied upon in estimating the two-response logistic regression, where the comparison was used between the method of Nadaraya-Watson and the method of Local Scoring algorithm, and optimal Smoothing parameter λ was estimated by the methods of Cross-validation and generalized Cross-validation, bandwidth optimal λ has a clear effect in the estimation process. It also has a key role in smoothing the curve as it approaches the real curve, and the goal of using the Kernel estimator is to modify the observations so that we can obtain estimators with characteristics close to the properties of real parameters, and based on medical data for patients with chro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Compared Methods of Generating Both Gamma Distribution and Beta Distribution
...Show More Authors

Beta Distribution

Abstract

             Gamma and Beta Distributions has very important in practice in various areas of statistical and applications reliability and quality control of production. and There are a number of methods to generate data behave on according to these distribution. and These methods bassic primarily on the shape parameters of each distribution and the relationship between these distributions and their relationship with some other probability distributions.    &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Nov 30 2007
Journal Name
Alustath Journal For Human And Social Sciences
Plagiarism in Theses and Dissertations: Methods of Detecting and Avoiding
...Show More Authors

The present study aims at identifying the styles, procedures of Iraqi universities to avoid plagiarism and evaluate these steps, also to evaluate the form prepared by the Directory of Scientific Supervision and Evaluation, Ministry of Higher Education and Scientific Research. The study uses documentary style, 150 teachers in the following colleges (Education Ibn Rushd, Languages and Arts) in university of Baghdad whom already used the aforementioned list were the sample of the study and they asked to give their opinions about the list.The study consists of five sections, first one deals with general view, second explains plagiarism and its types, shapes and reasons,third tackles with ways of detecting plagiarism, its programs, consequences

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 28 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A Proposed Framework to Developing the Auditor's Reporting in Iraq in Accordance With the International Standards on Auditing
...Show More Authors

The international reporting auditor witness rapidly developed over the past years, where profession began give attention to the development of auditor reporting and improve its informational report through the issuance and amendment of some relevant international auditing standards. The reality of the situation refers to the failure to inform the auditor in Iraq in  many areas, including: Clearly defined management responsibility for the preparation of financial and auditor's responsibility to express an opinion on these statements and Amendment of opinion when the financial statements as a whole is free from material misstatement based on the evidence is sufficient and appropriate audit, or not to build the auditor's ability to obt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Biodiversity And Environmental Sciences (jbes)
Effect of potassium fertilization and organic nutrient (Reef Amirich) in the population density of Bemisia tabaci (Genn.) and Thrips tabaci (L.) on cucumber
...Show More Authors

A field study was conducted at the college of Agriculture, Baghdad University-Jadiriyah to investigate the effect of adding potassium fertilizer and organic nutrient (Reef Amirich) on the population density of two sucking pests of cucumber, cotton whitefly, Bemisia tabaci and onion thrips, Thrips tabaci during the spring season/2016. Results indicated that potassium sulphate (50, 100 and 150 kg/ha) and organic nutrient (0.8 and 1.6ml/l) reduced both the population density of B. tabaci and T. tabaci nymphs depending on the fertilizer level of the user, the treatment 150 kg/ha for the potassium fertilizer and 1.6 ml/L for organic nutrient was the highest among others when minimized density of nymphs by 1.62 nymphs of B. tabaci/disk leaf and 0

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Quality Function Deployment in Evaluating The Product Applied Research in General Company For Vegetable Oil Industry- Al-M'amoon Factory
...Show More Authors

The Quality  function deployment (QFD)  tool is an important  tool of total quality management because its a link between two important parts customer and production process of the product, using advanced House of quality, which contributed to provide more details about improving the product before it had a vision for the future of the product be improved. Also the identification of the two competitors (Alwazeer , Altouri) bases on the survey of retailers  which they identified five competitors products (Alwazeer , Altouri , Ferry , Jif , Dina)for the product (Zahi). Then House of quality  to product (Zahi) has been developed  By using a Kano Model  to classify of customer's requirements for the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 18 2022
The modeling techniques of the second‐order correlation function <i>g</i> <sup>(2)</sup> ( <i>τ</i> ) for a quantum emitter
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Digital Image Authentication Algorithm Based on Fragile Invisible Watermark and MD-5 Function in the DWT Domain
...Show More Authors

Using watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 03 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using of Some Aqueous Plant Extracts in TreatIng the Gold Fishes, Carassius auratus Infected With the Fungus,Saprolegnia sp
...Show More Authors

 The gold fishes, Carasusius auratus infected with the fungus, Saprolegnia sp. were treated with different concentrations of Aqueous extracts of coriander , Coriandrun sativum seeds and Henna, Lawsonia inermis leaves by applying the dip method in a water bath for five minutes. The total killing of these fungi was achieved by using 30 % of the C. sativum seeds from Aqueous extract and 40 % of the L. inermis leaves from Aqueous extract.   Changes in behaviors of treated fishes, were increased with the increasing concentration for plant extract of C. sativum seeds. It was observed excitation of fishes , crushing with aquaria sides, jumping outside of aquaria, as well as increasing the number opercula movements . While in case

... Show More
View Publication Preview PDF