Preferred Language
Articles
/
bsj-6898
Estimation of Parameters for the Gumbel Type-I Distribution under Type-II Censoring Scheme
...Show More Authors

This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different prior distributions are used. Also, the Bayesian estimators concerning the parameters of interest under various loss functions are investigated. The Gibbs sampling algorithm is used to construct the Bayesian credible intervals. Then, the efficiencies of the maximum likelihood estimators are compared with Bayesian estimators via an extensive Monte Carlo simulation study. It has been shown that the Bayesian estimators are considerably more efficient than the maximum likelihood estimators. Finally, a real-life example is also presented for application purposes.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 29 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
APPLICATION OF TQM REQUIREMENTS AND THEIR RELATIONSHIP TO ORGANIZATIONAL PERFORMANCE FROM THE POINT OF VIEW OF THE INTERNAL CUSTOMER/ COMPARATIVE STUDY.: APPLICATION OF TQM REQUIREMENTS AND THEIR RELATIONSHIP TO ORGANIZATIONAL PERFORMANCE FROM THE POINT OF VIEW OF THE INTERNAL CUSTOMER/ COMPARATIVE STUDY.
...Show More Authors

This study aims to Statement of the relationship between Total Quality Management philosophy and Organizational performance from the point of view of the internal customer. A comparison has been made between two companies, one of which applies the requirements of TQM well and the other does not apply these requirements as the (General Company for Electrical Industries/ Diyala) and (General Company for Electrical Industries/ Baghdad) to conduct the search, During the questionnaire prepared for this purpose and distributed to a sample of 30 employees in the General Company for Electric Industries/ Diyala and (20) employees of the General Company for Electrical Industries/ Baghdad. Their answers were analyzed using a simple correlation coef

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
The Use Of the Bayesian Method and Restricted Maximum Likelihood in estimating of mixed Linear Components with random effects model with practical application.
...Show More Authors

In this research we study a variance component model, Which is the one of the most important models widely used in the analysis of the data, this model is one type of a multilevel models, and it is considered as linear models , there are three types of linear variance component models ,Fixed effect of linear variance component model, Random effect of linear variance component model and Mixed effect of linear variance component model . In this paper we will examine the model of mixed effect of linear variance component model with one –way random effect ,and the mixed model is a mixture of fixed effect and random effect in the same model, where it contains the parameter (μ) and treatment effect (τi ) which  has

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 28 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
The Relationship between ABO Blood Group Distribution and the incidence of Upper Gastric and Duodenal Ulcer in Iraqi Patients
...Show More Authors

The relationship between blood group antigens and peptic ulcer disease has been widely evaluated in the past, but only one study relating H pylori seroprevalence to ABO blood groups among Iraqi patients with peptic ulcer disease is available. We aimed to evaluate the frequency of peptic ulcer disease among different ABO blood groups in Iraqi patients, and we thought it was worthwhile to try to determine whether these components take some part in disease etiology. One hundred and six patients with peptic ulcer disease (PUD) (43 male and 63 female; mean  age: 48 ± 18 years) who attended Baghdad teaching hospital and Al- Yarmouk teaching hospital endoscopy centers were enrolled , and 238 control Subjects.  Fing

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Impact Cloud Computing On The Development of Accounting Education: Evidence From Sultanate of Oman
...Show More Authors

Cloud computing is the new technological trend for future generations. It represents a new way to use IT resources more efficiently. Cloud computing is one of the most technological models for developing and exploiting infrastructure resources in the world. Under the cloud, the user no longer needs to look for major financing to purchase infrastructure equipment as companies, especially small and medium-sized ones, can get the equipment as a service, rather than buying it as a product. The idea of ​​cloud computing dates back to the sixties of the last century, but this idea did not come into actual application until the beginning of the third millennium, at the hands of technology companies such as Apple, Hp, IBM, which had

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Experimental Study for Materials Prosthetic above Knee Socket under Tensile or Fatigue Stress with Varying Temperatures Effect
...Show More Authors

The residual limb within the prosthesis, is often subjected to tensile or fatigue stress with varying temperatures. The fatigue stress and temperatures difference which faced by amputee during his daily activities will produces an environmental media for growth of fungi and bacteria in addition to the damage that occurs in the prosthesis which minimizingthe life of the prosthetic limb and causing disconfirm feeling for the amputee.

In this paper, a mechanical and thermal properties of composite materials prosthetic socket made of different lamination for perlon/fiber glass/perlon, are calculated by using tesile test device under varying temperatures ( from 20oC to 60oC), also in this paper a device for measuring rotational bendin

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Tue Oct 01 2013
Journal Name
Radioelectronics And Communications Systems
BER performance enhancement for secure wireless communication systems based on DCSK-MIMO techniques under Rayleigh fading channel
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Study the Axail Dispersion Model in Ion Exchange Column
...Show More Authors

A mathematical model is developed which predicates the performance of cylindrical ion exchange bed involving comparing of axial dispersion model for cation exchange column with different assumption, this model permits the performance to predicate the residence time within the bed with the variance, axial dispersion and Pecklet No. to indicated deviation from plug flow model.

      Two type of systems are chosen for positive ions first with divalent ions (Ca+2) to exchange with resin of Na+1form used as application in  water softener units and second with monovalent ions (Na+1) to exchange with resin of H+1 form used as application in deionize water units &n

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
On Finitely Null-additive and Finitely Weakly Null-additive Relative to the σ–ring
...Show More Authors

     This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.

View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Sat Mar 25 2023
Journal Name
International Journal Of Drug Delivery Technology
Preparation, Characterization, Antioxidant and Antibacterial Studies of New Metal (II) Complexes with Schiff Base for 3-amino-1-phenyl-2- pyrazoline-5-one
...Show More Authors

A new ligand complexes have been synthesis from reaction of metal ions of Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II), Hg(II), Pd(II) and Pt(II) with schiff base LH. 5-[(2-Hydroxy-naphthalen-1-ylmethylene)-amino]-2-phenyl-2,4-dihydro-pyrazol-3-one, this ligand was characterized by Fourier transform infrared (FTIR), UV-vis, 1H, 13CNMR, and mass spectra. All complexes were characterized by techniques micro analysis C.H.N, UV-vis and FTIR spectral studies, atomic absorption, chloride content, molar conductivity measurements and magnetic susceptibility. The ligand acts as bidentate, coordination through nitrogen atom from azomethin group and deprotonated phenolic oxygen atom. The spectroscopic and analytical measurements showed that

... Show More
View Publication