In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators.
The aim of the research is to assess the practice of tax administration to diminish the strategic direction of (proactive, analytical, defensive, response) and the nature of its relationship to organizational excellence represented by (leadership, strategic planning, focus on taxpayers, information and analysis and knowledge management, focus on operations, focus on forces. The questionnaire was adopted as a main tool in collecting data and information from the sample members of the General Authority for Taxes (110) who are in the site (m. Second Division Manager, Ms The statistical program (SPSS) was used to calculate (mean, standard deviation, difference coefficient, correlation coefficient, t-test). The research reached a number
... Show MoreThe security of information represent the available protection of information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential and controlling basis to protect individuals and companies from the damages. To insure the security and confidentiality of information there are delicate, proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR
... Show MoreThe research aims to identify the importance of using the style of the cost on the basis of activity -oriented in time TDABC and its role in determining the cost of products more equitably and thus its impact on the policy of allocation of resources through the reverse of the changes that occur on an ongoing basis in the specification of the products and thus the change in the nature and type of operations . The research was conducted at the General Company for Textile Industries Wasit / knitting socks factory was based on research into the hypothesis main of that ( possible to calculate the cost of activities that cause the production through the time it takes to run these activities can then be re- distributed product cost
... Show MoreThe study deals with an analysis of the contents of the publications of the campaign (Together to defeat Corona), which was established by the United Nations Development Program in Iraq in the face of the Covid 19 virus.The research problem raises a main question:What are the implications of the campaign (Together to defeat Corona) of the United Nations Development Program (Iraq office) in addressing the Covid-19 virus in Iraq?From this main question, several sub-questions emerged, which were answered by this study in its chapters and investigations, including regarding the contents of advertisements, photos and videos for the publications of the (Together to Defeat Corona) campaign for the United Nations Iraq Office on their Facebook pageA
... Show MoreThe current research aims to investigate the effect of a specimen of Daniel in the acquisition of concepts for the Arabic language curricula material to the students of the third phase of the Faculty of Basic Education Department of Arabic Language. The sample consists of (93) applications and a student of (47) students in the Division (A), which represents the experimental group which studied the use of a specimen of Daniel, and (46) students in the Division (B), which represents the control group, which studied the traditional way. The subject of unified two groups, which subjects the Arabic language curricula which includes six chapters.
The duration of the experiment is a full semester. The researchers also prepared a tool for mea
The present research is descriptive and analytical by nature; it practically presents the method of implementing the standard pattern in an unconventional way using the bias-cut line. The study aims at investigating the variables of bias-cut and their suitability for fitting large-shaped Iraqi ladies. It also aims at exploring the artistic and innovative features of the bias-cut. Therefore, one needs to understand the rules and basics of clothing and the nature of the body to reach the maximum degree of control.Consequently, the study is to answer the following questions: What is the effectiveness of tailoring on the bias-cut in fitting a standard template of a large-shaped Iraqi ladies? Is it possible to obtain from the offered possibil
... Show MoreThe theme of love has been and still is the interest of authors and writers for it is closely related to people’s lives. That great passion has helped them express genuine thoughts pertinent to that theme that has given rise to many debates, some are vague and others controversial. In his (strait is the gate), (La Porte étroite), André Gide has sought to shed light on his characters perspective of love and its relationship with sacredness and divine happiness. Indeed these characters have found often themselves restrained, chained and exhausted, by tough religious commands that have imposed on them spiritual commitments and duties too hard to break.
André Gide has revealed a protestant deviation from the perfection theme tha
... Show MoreAbstract:
The current research included " Diagnosis of the reality of the gap for the requirements of Business Continuity Management System According to International Standard (ISO 22301: 2012) in Midland Refineries Company (Daura Refinery) " , for development of an administrative system for Business Continuity is considered a priority in the present day, and in the light of the organizations dependence on computers and information technology in work and communication with others . the international legitimacy (represented by the international organization for standardization (ISO)) remains the basis for matching and commitment , and the importance of the application of Business Continuity Management Syst
... Show More