Preferred Language
Articles
/
bsj-4154
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 01 2011
Journal Name
International Journal Of Data Analysis Techniques And Strategies
A class of efficient and modified testimators for the mean of normal distribution using complete data
...Show More Authors

View Publication
Scopus (9)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
External audit data on liabilitySocial organizations for profit
...Show More Authors

Givers of foreign Audit about Social Responsibility of Profit Organization. The recent time is charcterstically with big economic Organization activities, because there are many transactions between these Organizations and different financial markets development techniques.

This  encourgage business men to increase their efforts for investment in these markets. Because the Accounting is in general terms it represents a language of these Unions Activities and translate them in to fact numbers, for that there is need for Accounting recording for certain of these Organizations behavior and their harmonization with their Objectives.

In this respect the Audit function comes to che

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Ieee Access
Fuzzy-Based Ensemble Feature Selection for Automated Estimation of Speaker Height and Age Using Vocal Characteristics
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Apr 03 2016
Journal Name
Journal Of Educational And Psychological Researches
Educational values when Imam Shafie i through his hair
...Show More Authors

In this research was the study of the educational values ​​when Shafei, contained in hair Shafi'i, and that what the role of these values ​​in the education of generations, and the possibility of their application in the educational curriculum. Find addressed Shafei life and his time. The values ​​derived from his hair, as well as quoting from the Koran and influenced by it, which is evident in the hair, governance and eating Alomthal.okzlk Find the importance of this thought in modern education, so as to realism and ease of application. It is the search results, the Shafi'i put thought educationally integral based on the Koran rise to the level of theory. Find and conclusions: that education in its present situation

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Oral Health Status, Salivary MMP-8& Secretory Leukocyte Peptidase Inhibitor (SLPI) Among Uncontrolled Type-I Diabetes Mellitus In Iraqi Patients
...Show More Authors

Background: diabetes is a metabolic disease characterized by hyperglycemia that results in deficiency or absence of insulin production. The dental caries and gingivitis/periodontitis are widespread chronic diseases in diabetes. The aim of the present study was determined the salivary matrix metalloproteinase (MMP-8), Secretory Leukocyte Peptidase Inhibitor (SLPI) and oral health status among uncontrolled diabetic group in comparison with healthy control group. Materials and Methods: The total sample composed of 90 adults aged (18-35) years. Divided into 60 uncontrolled diabetic patients (HbA1c >7%) and 30 healthy control group. Unstimulated saliva was collected from each subject with type-I DM, BMI, duration of diabetes, HbA1c%, DMFT, gingi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Nov 17 2019
Journal Name
Journal Of Interdisciplinary Mathematics
Soft 𝒦(<i>sc</i>)-spaces
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Nov 17 2021
Journal Name
Infectious Diseases
<i>Candida albicans</i> and Abortion
...Show More Authors

An abortion that occurs spontaneously is known as a miscarriage. Various effectors associated with abortion such as Genetic and uterine anomalies, Endocrinopathy, immunological dysfunctions, infectious agents, environmental contaminants, psychogenetic elements, and endometriosis. Maternal infections considered the main reason for pregnancy wastage in females with Bad Obstetric History (BOH). Candida albicans is a dimorphic fungus that can grow as yeast or filamentous cells and considered one of the limited species of the Candida genus that cause humans candidiasis. It is an opportunistic fungus that responsible for mucosal infections in the mouth and genital tract. Excessive growth of C. albicans will follow with Vulvovaginal candid

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
ADVERTISEMENTS IN THE CINEMA STARTING FROM THE MID 20TH CENTURY
...Show More Authors

At the time when many important political events and evolutions took place, the cinema has been pretty active, and witnessed the historical events before and after the two world wars and the cold war. During the first half of the 20th century, the cinema had great interest from the major countries and their politicians, as well as the commercial turnout of large companies to invest in that field for the profits.  In the beginning of the 20th century, the major powers like the Soviet Union, the United States, Germany, Italy, England, and France started to compete in the development of their film industry and the investment of the new medium and the transformation of some famous works of fiction into films that perpetuate their cultur

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Nov 21 2013
Journal Name
المؤتمر العلمي الدولي الرابع لاتحاد الاحصائيين العرب / بغداد
Estimating Fertility Rates in Iraq by using (Lee-Carter) Model And Forecasting for the Period (2012_2031)
...Show More Authors

A large number of researchers had attempted to identify the pattern of the functional relationship between fertility from a side and economic and social characteristics of the population from another, with the strength of effect of each. So, this research aims to monitor and analyze changes in the level of fertility temporally and spatially in recent decades, in addition to estimating fertility levels in Iraq for the period (1977-2011) and then make forecasting to the level of fertility in Iraq at the national level (except for the Kurdistan region), and for the period of (2012-2031). To achieve this goal has been the use of the Lee-Carter model to estimate fertility rates and predictable as well. As this is the form often has been familiar

... Show More
Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref