Preferred Language
Articles
/
bsj-4154
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Notes on estimation of ARMA model (1.1) And ARMA (0,1)
...Show More Authors

By driven the moment estimator of ARMA (1, 1) and by using the simulation some important notice are founded, From the more notice conclusions that the relation between the sign   and moment estimator for ARMA (1, 1) model that is: when the sign is positive means the root      gives invertible model and when the sign is negative means the root      gives invertible model. An alternative method has been suggested for ARMA (0, 1) model can be suitable when

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 01 2021
Journal Name
Pakistan Journal Of Statistics
Estimation intensity radiation of chest X-ray (CXR) with application
...Show More Authors

In this research we assumed that the number of emissions by time (𝑡) of radiation particles is distributed poisson distribution with parameter (𝑡), where  < 0 is the intensity of radiation. We conclude that the time of the first emission is distributed exponentially with parameter 𝜃, while the time of the k-th emission (𝑘 = 2,3,4, … . . ) is gamma distributed with parameters (𝑘, 𝜃), we used a real data to show that the Bayes estimator 𝜃 ∗ for 𝜃 is more efficient than 𝜃̂, the maximum likelihood estimator for 𝜃 by using the derived variances of both estimators as a statistical indicator for efficiency

Preview PDF
Scopus
Publication Date
Wed Feb 07 2024
Journal Name
Egyptian Journal Of Chemistry
Spectrophotometric Estimation of Methyldopa Drug in pure and pharmaceutical formulations
...Show More Authors

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sun Jun 02 2019
Journal Name
International Journal Of Drug Delivery Technology
Kinetic-spectrophotometric estimation of tetracycline in bulk and pharmaceutical forms
...Show More Authors

Simple and sensitive spectrophotometric method is described based on the coupling reaction of tetracycline hydrochloride (TC. HCl) with diazotized 4-aminopyridine in bulk and pharmaceutical forms. Colored azo dye formed during this reaction is measured at 433 nm as a function of time. Factors affecting the reaction yield were studied and the conditions were optimized. The kinetic study involves initial rate and fixed time (10 minutes) procedures for constructing the calibration graphs to determine the concentration of (TC. HCl). The graphs were linear for both methods in concentration range of 10.0 to 100.0 μg.mL-1. The recommended procedure was applied successfully in the determination of (TC. HCl) in its commercial formulations.

Scopus (3)
Scopus
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
SDPLL-Based Frequency Estimation of a Sinusoid in Colored Noise
...Show More Authors

The problem of frequency estimation of a single sinusoid observed in colored noise is addressed. Our estimator is based on the operation of the sinusoidal digital phase-locked loop (SDPLL) which carries the frequency information in its phase error after the noisy sinusoid has been acquired by the SDPLL. We show by computer simulations that this frequency estimator beats the Cramer-Rao bound (CRB) on the frequency error variance for moderate and high SNRs when the colored noise has a general low-pass filtered (LPF) characteristic, thereby outperforming, in terms of frequency error variance, several existing techniques some of which are, in addition, computationally demanding. Moreover, the present approach generalizes on existing work tha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Estimation and Simulation in Batch Fermentation of Baker's Yeast Production
...Show More Authors

Baker's Yeast is an important additive among the substances, which improves bred quality, thus, a consideration has been made to study the conditions and parameters that affecting the production of the yeast in a batch fermenter experimentally and theoretically. Experimental runs were implemented in a 12-liter pilot-scale fermenter to predict the rate of growth and other parameters such as amount of additive consumed and the amount of heat generated. The process is modeled and performed using a computer programming prepped for this purpose, the model gave a good agreement comparing to the experimental work specially in the log phase.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Periodicals Of Engineering And Natural Sciences
Constructing a new mixed probability distribution with fuzzy reliability estimation
...Show More Authors

This paper deals with constructing mixed probability distribution from mixing exponential

Scopus (5)
Scopus
Publication Date
Sat Dec 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
استعمال أنموذج (Altman) للإفلاس دالة لقياس الأداء دراسة تطبيقية في بعض الشركات المساهمة الخاصة العراقية
...Show More Authors

Performance measures are a central component of management control system, making good planning and control decisions requires information about how different subunits of organizations have performed. To be effective, performance measures (both financial and nonfinancial) must also motivate managers and employees at all levels of organization to strive to achieve organization goals.

To give aclear picture about performance must be used compound measure, that was best than single measure.

Altman model can be used as a compound performance measure that measures the performance by tied a sum of variables, due to make weight for every variable to reach for performance.

 

View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
: financial fraud ,Audit risks ,inherent risk ,Detection risk, Data Mining .
...Show More Authors

Abstract

The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref