This paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.
The concept of intertextuality was one of the problems that occupied the attention of critics and critics in targeting the structure of textual intertextuality between texts and their overlap in the process of producing meaning. Until intertextuality became a stable term and it can be monitored in the structure of the theatrical text and determining the mechanisms of this intertextuality between texts through fields and classifications agreed upon by the most important critics who wrote and considered intertextuality. Perhaps our previous research (the approach of exposure in the epistemological hallway to intertextuality) was an attempt to interview a terminology, which the researcher intended to monitor, through the mechanisms of inter
... Show MoreThe research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of common concepts in the field of communication and media. The researcher tries to find an analytical explanation of the relationship between technology by being an influential factor in building the information society, which is the basis of new media, and the technical output that influenced the forms of social relations and linguistic construction as a human communication tool. The research deals with an analytical approach between new media and traditional one in the light of the changes imposed by technology, which has been able to change a number of comm
... Show MoreThis Research based on an empirical study and tested the hypothesis of transition effects on a sample of young people in Sharjah University and trying to identify a new form of Media which is based on the production of new types of habits and patterns and their cultural impact. Recently, New Media appeared to refer to new types of Communication using the Internet. It’s enormous in the exchange of Information. The new Media contains multiple forms, including the form in which users produce by them to refer the entry of a new area of Media in which exchange of roles between the Sender and the recipient.
This study is trying to identify a new form of Media Web used (Press online or only Press online, Digi
... Show MoreThis study seeks to answer urgent questions about the role of new media that have emerged recently, such as the Internet and social networking sites and information services through mobile and others to increase awareness among young people, especially university students. during a field study that took place on a sample of students in the Department of Media at the University of Petra Kingdom of Jordan during the second semester in 2013 in the study the researcher finds increased attention and follow-up by young people for many of the world events and regional and local communities through exposure to a number of new media; in the forefront of the Internet and increase the level of awareness and interests young people do many of the eve
... Show MoreAbstract
The problem with the search at the reduction of adoption of new products, as there are three hypotheses of research have been formulated , the first one is no significant correlation between the religious and differences to customers and adopt new products, and This Study Aimed To Investigate The Relationship Between Religious differences for customers And New Products Adoption, Applied On Arab Mall Commercial Customers/ Egypt, an Analytical Model Is Developed As Guideline To Test The The Relationship Between Religious differences for customers And New Products Adoption, Aquantative Method With Deductive Approach Were Chosen In This Research . In Order To Collect Primary Data, A questionnaire Is
... Show MoreA novel series of mixed-ligand complexes of the type, [ML 1 (L 2 ) 3 ]Cl x [M = Cr(III), Fe(III), Co(II),Ni(II), Cu(II), Cd(II) and Hg(II), n = 2, 3], was synthesized using Schiffbase (HL 1 ) as main ligand, nicotinamide (L 2 ) as secondary ligand, and the corresponding metal ions in 1:3:1 molar ratio. The main ligand, HL 1 was prepared by the interaction of ampicillin drug and 4-chlorobenzophenone. The synthesized mixed ligand complexes were characterized by elemental analysis, UV-Vis, FT-IR, 1 H-NMR, 13 C-NMR and TG/DTG studies. In the mixed-ligand complexes, the Schiffbase ligand, HL 1 showed coordination to the central metal ion in tridentate manner via azomethine nitrogen, β-lactam ring oxygen and deprotonated carboxylic oxy- gen atom
... Show MoreThe research aims to identify the obstacles facing the application of electronic management in our university libraries, including the central library of the University of Baghdad and the central library of Al-Mustansiriya University, the research sample, as they are among the main libraries that used electronic technologies in managing some of their work and in providing their services, and they have a website via the Internet. The research relied on the case study method to identify the obstacles by visiting the two libraries, interviewing their managers and employees responsible for the departments, and answering inquiries about the obstacles that prevent the application of electronic management in order to identify them and find appropr
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Uropathogenic Escherichia coli is the main cause of urinary tract infections, the ability of this bacteria to cause urinary tract infections is related to a variety of virulence factors that enhance colonization and evade the immune response, one of these virulence factors is cytotoxic necrotizing factor 1 toxin which converts the glutamine residue to glutamic acid to activated GTPase Rho family. The study was meant to find out the prevalence rate of the cnf1 gene in Uropathogenic Escherichia coli isolated from Iraqi patients. Conventional laboratory methods were used for primary bacterial identification and molecular methods were used to confirm bacterial identity and gene detection. Escherichia coli was identified in 89/165 (53.93%) of th
... Show More