In this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of Bayes estimators of the shape parameter of the Maxwell distribution decreases with the increase of Jeffreys prior constants. The results also show that values of Bayes estimators are almost close to the maximum likelihood estimator when the Jeffreys prior constants are small, yet they are identical in some certain cases. Comparison with respect to loss functions show that Bayes estimators under the modified squared error loss function has greater MSE than the squared error loss function especially with the increase of r.
The research aims to identify small and medium enterprises in accounting thought in terms of definition and concept, and this international financial reporting standard for small and medium-sized enterprises (SMEs) in the theoretical aspect. As for the practical aspect, the small and medium-sized enterprises standard has been applied to the financial statements of the company in question, the preparation of the opening entry on the date of the transition, the requirements of measurement and the accounting disclosure on the date following the application of the standard, and the preparation of the company's financial statements and the accompanying explanations according to the standard of small and medium-sized enterprises. The r
... Show MoreThe efficiency evaluation of the railway lines performance is done through a set of indicators and criteria, the most important are transport density, the productivity of enrollee, passenger vehicle production, the productivity of freight wagon, and the productivity of locomotives. This study includes an attempt to calculate the most important of these indicators which transport density index from productivity during the four indicators, using artificial neural network technology. Two neural networks software are used in this study, (Simulnet) and (Neuframe), the results of second program has been adopted. Training results and test to the neural network data used in the study, which are obtained from the international in
... Show MoreThe two-neutron halo-nuclei (17B, 11Li, 8He) was investigated using a two-body nucleon density distribution (2BNDD) with two frequency shell model (TFSM). The structure of valence two-neutron of 17B nucleus in a pure (1d5/2) state and in a pure (1p1/2) state for 11L and 8He nuclei. For our tested nucleus, an efficient (2BNDD's) operator for point nucleon system folded with two-body correlation operator's functions was used to investigate nuclear matter density distributions, root-mean square (rms) radii, and elastic electron scattering form factors. In the nucleon-nucleon forces the correlation took account of
... Show MoreInvestigating gender differences based on emotional changes becomes essential to understand various human behaviors in our daily life. Ten students from the University of Vienna have been recruited by recording the electroencephalogram (EEG) dataset while watching four short emotional video clips (anger, happiness, sadness, and neutral) of audiovisual stimuli. In this study, conventional filter and wavelet (WT) denoising techniques were applied as a preprocessing stage and Hurst exponent
Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show MoreThe problem of research was the lack of research that dealt with issue of the organizational environment, job design approach that is more suitable for knowledge work, therefore, the research aims to determine the impact of quality of working life and job enrichment on knowledge capital, starting from the hypothesis that there significant impact of quality of working life and job enrichment on knowledge capital, to achieve this goal the researcher from the theoretical literature and related studies conclude to the construction of the scheme shows the hypothetical relationship between the variables, which was adopted quality of working life and job enrichment as independent variable while knowl
... Show MoreThe development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in
... Show More