In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators.
Autorías: Hadeer Idan Ghanim, Ishraq Mahmood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2021. Artículo de Revista en Dialnet.
Background: World Health Organization (WHO) and United Nation International Children Fund (UNICEF) developed a strategy known as Integrated Management of Childhood Illness (IMCI); which aims to reduce less than five years children morbidity and mortality in developing countries.
Objective: To assess the completion of the IMCI format status in primary health care centers, Baghdad.
Methods: A cross sectional study with analytic element was conducted during the period from 15th of January till 15th May 2016 in selected Primary health centers in Baghdad, Iraq. The sample consists of form of child files less than 2 months and form from 2
... Show MoreThe research aims to measure the economic efficiency and technological change and the total productivity of resources using the parameter and non-parameter methods, for agricultural companies registered in the Iraqi stock exchange, the number of 6 companies for the period from 2005 to 2017 based on the hypothesis that the agricultural companies do not achieve economic efficiency and does not control the management of its operations, and It may be technically efficient but the size of its operations is not optimal. From non-parametric methods, the data envelope analysis method was used. Using the DEAP program, the Middle East Company achieved the highest average technical and cost efficiency of 0.62 and 0.58, respectively. The Iraq
... Show MoreDiyala Governorate has many unique and diverse geomorphological features that the region enjoys, which are among the attractions for natural tourism, as the natural environment is considered a maker of tourism. The importance of geomorphological aspects as components of natural tourism is due to their association with tourism and entertainment, as a result of the enjoyment of many geomorphological aspects of the beauty of its natural landscape on the one hand, and on the other hand, the association of these manifestations with different types of tourism activity. Any tourist area as it is the main factor for tourist attractions, such as the presence of the Hamrin hills, and sand dunes. Planning for the development of tourism activity in the
... Show MoreThe nuclear charge density distributions, form factors and
corresponding proton, charge, neutron, and matter root mean square
radii for stable 4He, 12C, and 16O nuclei have been calculated using
single-particle radial wave functions of Woods-Saxon potential and
harmonic-oscillator potential for comparison. The calculations for the
ground charge density distributions using the Woods-Saxon potential
show good agreement with experimental data for 4He nucleus while
the results for 12C and 16O nuclei are better in harmonic-oscillator
potential. The calculated elastic charge form factors in Woods-Saxon
potential are better than the results of harmonic-oscillator potential.
Finally, the calculated root mean square
In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .
The purpose of this research is to enhance the role of organizational communication in organizations using IT technologies. The results showed that there is a strong relationship with information technology technologies in enhancing the role of organizational communication, which in turn helps to improve the performance of organizations in general
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show More