This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different
... Show MoreThe purpose of this paper is to statistically classify and categorize Building Information Modelling (BIM)-Facility Management (FM) publications in order to extract useful information related to the adoption and use of BIM in FM.
This study employs a quantitative approach using science mapping techniques to examine BIM-FM publications using Web of Science (WOS) database for the period between 2000 and April 2018.
The findi
In many organizations, employees who have high mental skills are the main source of organizational creativity. When a firm does not put creativity as a goal, cannot stand solid against the competition. Nowadays, knowledge is the path to discover the innovation and creativity aspects, This can assist the firm to stand face to face with competition in the market. The importance of this research comes from detecting and knowing the relation between creativity and knowledge to know and detect the influence of organizational creativity on backing the management of knowledge and determine the final results. The problem of research is to trace the role of organizational creativity on knowledge management processes in order to enable the
... Show MoreIn the last years, the research of extraction the movable object from video sequence in application of computer vision become wide spread and well-known . in this paper the extraction of background model by using parallel computing is done by two steps : the first one using non-linear buffer to extraction frame from video sequence depending on the number of frame whether it is even or odd . the goal of this step is obtaining initial background when over half of training sequence contains foreground object . in the second step , The execution time of the traditional K-mean has been improved to obtain initial background through perform the k-mean by using parallel computing where the time has been minimized to 50% of the conventional time
... Show MoreIn the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),
... Show MoreThe present study aims at assessing the status of heavy metals such as nickel, cadmium and lead to pollute some areas of Baghdad city. In this study the spectral absorption device and the program ArcGIS 10.2 will using. The soil samples were taken from five different locations in Baghdad, including Ameriya, Kadhimiya, Palestine Street, Jadiriyah and Taji for the 5cm depth layer on both sides of the road. This work on soil samples has been completed in two :phases 1 - Preparation of samples: For the purpose of converting solid material into a extract containing elements in the form of single ions can be estimated by the device 2-Determination of elements: Samples prepared to the device
Copyright hacking and piracy have increased as the Internet has grown in popularity and access to multimedia material has increased. Security, property protection, and authentication have all been achieved via watermarking techniques. This paper presents a summary of some recent efforts on video watermarking techniques, with an emphasis on studies from 2018 to 2022, as well as the various approaches, achievements, and attacks utilized as testing measures against these watermarking systems. According to the findings of this study, frequency-domain watermarking techniques are more popular and reliable than spatial domain watermarking approaches. Hybrid DCT and DWT are the two most used techniques and achieve good results in the fi
... Show More