In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators.
A discussion about the repercussions of the exchange rate on the behavior of stock markets became one of the basic principles of financial economics. The Istanbul Stock Exchange , considered one of the fastest financial markets growing in the region, driven by solid economic activity, for a diversified economy which classified as one of the the fastest growing economies in the world. However, the aforementioned market witnessed sharp fluctuations in the past few months, coinciding with the continuous fluctuations in the exchange rate of the Turkish lira, posing a serious challenge to the economic and investment environment in a c
... Show MoreRecently, young people have shown a desire to keep cats as pets, despite being threatened with health problems including toxoplasmosis. Therefore, the current study was aimed to detect toxoplasmosis infections among of volunteers students as well as spreading health awareness among students and knowledge about the importance of this disease. Prevalence rate and effects of liver functions were tested by measured levels of Aspartate aminotransferase (AST) and Alanine aminotransferase (ALT) enzymes while the OnSiteToxo IgG/IgM combo rapid test was used in the diagnosis of the disease. The blood samples were collected from 76 volunteers (35 male and 41 female). The results showed that, the total percentage of infections was 27.6% and all infect
... Show MoreGA Al Omran, AA Noaimi, Z Al Madfai, H Al Hamamy, Journal of the Faculty of Medicine Baghdad, 2012
Background: Pain is one of the most reported side effects of orthodontic treatment despite the advanced technology in orthodontics. Many analgesics have been introduced to control orthodontic pain including acetaminophen and selective and nonselective nonsteroidal anti-inflammatory drugs. The great concern about these drugs is their adverse effect on rate of teeth movement. Aims: The purpose of this study was to evaluate and compare the effect of acetaminophen, ibuprofen and etoricoxib on pain perception and their influence on the rate of teeth movement during leveling and alignment stage. Methods: Forty patients were evenly and randomly distributed in a blinded way to one of four groups: placebo (starch capsules), acetaminophen 500mg th
... Show MoreThe research addressed the formal functions resulting from the use of various guiding signs in the design of the interior spaces of airports in various pragmatic, expressive and psychological aspects. The aim is to identify the functions the guiding signs perform in facilitating and organizing the travelers' movement and satisfying the needs of the visitors and users of the unfamiliar places which they intend to visit, the nature of the services offered by these signs as one of the important parts within their general design. The research also identified the concept and types of signs as a means of visual communication and how to employ them in the design of the airports public spaces, and what are the criteria of their use and fu
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More