This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different prior distributions are used. Also, the Bayesian estimators concerning the parameters of interest under various loss functions are investigated. The Gibbs sampling algorithm is used to construct the Bayesian credible intervals. Then, the efficiencies of the maximum likelihood estimators are compared with Bayesian estimators via an extensive Monte Carlo simulation study. It has been shown that the Bayesian estimators are considerably more efficient than the maximum likelihood estimators. Finally, a real-life example is also presented for application purposes.
The expenditures of the general budget, in its operational and investment divisions, are a basic factor in the economic and social growth of any country, and its impact on various economic activities such as income, employees , and the standard of living of members of society. This was based on a basic premise: Does increasing or decreasing investment expenditures have an effect on increasing or decreasing the tax proceeds, What is the level of relationship between them? and to achieve the goal of the research, an inductive and analytical method was chosen to measure the impact of the investment budget expenditures on the tax outcome quantitatively using the financial data obtained from The General Authority for Taxes, Ministry of Financ
... Show MoreIn this paper we use the Markov Switching model to investigate the link between the level of Iraqi inflation and its uncertainty; forth period 1980-2010 we measure inflation uncertainty as the variance of unanticipated inflation. The results ensure there are a negative effect of inflation level on inflation uncertainty and all so there are a positive effect of inflation uncertainty on inflation level.  
... Show MoreObjective(s): To evaluate and compare between Health Promotion Program for the Prevention of Epidemics at Primary Health Care Centers in Baghdad City.
Methodology: A descriptive study, using the evaluation and comparative approaches, is conducted to evaluate health promotion program for the prevention of epidemics at primary health care centers in baghdad city from October 15th 2019 through March 1st 2020. A purposive, non-probability, sample of (42) health promotion unit officers were recruited from the same number of primary health care centers which were divided into (14) main, (14) sub and (14) family medicine primary health care centers i
... Show MorePregnancy pose an additional burden on the body of the mother so as to meet their needs and the needs of the fetus and the body's need to iron increases excessively during pregnancy and iron is an essential element for the formation of hemoglobin blood Either hemoglobin is the key ingredient for red blood cells which carries oxygen to parts of the body, alas, most of the pregnant women begin their pregnancy inadequate stocks of iron in their bodies, which does not cover their need and requirement of the fetus, especially in the second and third trimesters of pregnancy When you reach the mother to the period in which they did not have the adequate amount of iron to produce hemoglobin become the mother was anemic So emerged the problem of
... Show MoreHomomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show MoreA novel ligand, (E)-5-((2-hydroxy-4,6-dimethylphenyl)diazenyl)-2,3-dihydrophthalazine-1,4- dione, was synthesized through the reaction of 3,5-dimethylphenol with the diazonium salt of 5-amino-2,3-dihydrophthalazine-1,4-dione. The ligand underwent characterization through the utilization of diverse spectroscopic methods, including UV-Vis, FT-IR, 13C, and 1H-NMR, alongside Mass spectroscopy and micro elemental analysis (Carbon, Hydrogen, Nitrogen, and Oxygen). Metal chelates of transition metals were prepared and analyzed using elemental analysis, mass spectra, atomic absorption, UV-Vis, FT-IR spectral analysis, as well as conductivity and magnetic measurements. The investigation into the compounds’ nature was conducted by utilizing mole r
... Show More
This research addresses: Sharh Usul Al-Bazdawi "Explanation of the Fundamentals for Al-Bazdawi", by studying and investigating, from the beginning of prohibition chapter to its end. The researcher conducted a study about this book stating its significance and introducing the compiler and the commentator. The researcher as well mentioned that the prohibition has a special formula and requires repetition, and he went on explaining that prohibition according to Hanafis does not require absolute corruption of the prohibited matter unless based on an evidence, and that what is condemned as wrong act for itself is considered void and what is condemned as wrong act for external reasons is considered corrupt accor
... Show MoreFor extraction chloro anion complexes of Cd2+ and Hg2+ used many organic agents as extractant according to liquid ion exchange method such as α-Naphthyl amine (α-NA), 4-Amino benzoic acid (4-ABA), 2-[(4-Carboxy methyl phenyl) azo]-4,5-diphenyl imidazole (4CMePADPI) and Cryptand (C222). This study includes definition hydrochloric acid concentration in aqueous phase and shaking with organic phase necessary for extraction as well as shaking time, organic solvent effect, interferences and alkaline salt effect. Thermodynamic showed the ion exchange reaction was exothermic for α-NA, C222 and endothermic for 4-ABA, 4-CMePADPI for extraction CdCl4=, but for extraction HgCl4= was exothermic with 4-ABA, 4CMePADPI and C222 but
... Show MoreThe cost-effective removal of heavy metal ions represents a significant challenge in environmental science. In this study, we developed a straightforward and efficient reusable adsorbent by amalgamating chitosan and vermiculite (forming the CSVT composite), and comprehensively investigated its selective adsorption mechanism. Different techniques, such as Fourier-transform infrared spectroscopy (FTIR), zeta potential analysis, scanning electron microscopy (SEM), X-ray diffraction (XRD), and Brunauer, Emmett, Teller (BET) analysis were employed for this purpose. The prepared CSVT composite exhibited a larger surface area and higher mesoporosity increasing from 1.9 to 17.24 m2/g compared to pristine chitosan. The adsorption capabilities of the
... Show More