This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different prior distributions are used. Also, the Bayesian estimators concerning the parameters of interest under various loss functions are investigated. The Gibbs sampling algorithm is used to construct the Bayesian credible intervals. Then, the efficiencies of the maximum likelihood estimators are compared with Bayesian estimators via an extensive Monte Carlo simulation study. It has been shown that the Bayesian estimators are considerably more efficient than the maximum likelihood estimators. Finally, a real-life example is also presented for application purposes.
This growing interest of the international scientific specialized commissions is due to the role that the audit committee can play, as one of companies’ governance tools, to increase the accuracy and transparency of the financial information disclosed by the companies, through its oversight role on the process of preparing financial reports, its supervision on the internal audit function within the companies, and supporting its independency, as well as coordinating the efforts between the internal control unites and the external auditor represented by the (Board of Supreme Audit) to clear the observations and irregularities in order to reduce the fraud cases.
This research was built on an applied sample of audit committee works
... Show MoreThe international humanitarian law found the special rules to protect women meanwhile the armed conflicts whether international or non-international. These rules are adopted for woman because of two reasons : that she is from civilians and on the other hand that her special constitution demands a special protection. The international community's attention of women is increased as a result of the tragic situation that faced women around the world especially in the Middle East and particularly in Iraq during the American-British war and ISIS period, these two periods sort many negative effects that reach women such as captivity, slavery, sexual enslavement and rape women especially Yazidis and Christians....
Type 1 Diabetes melittus ( T1DM ) is Considered as one of the
complicated and chronic disease that affects the dietary patterns for diabetic
child and his normal growth . for this reason , this study aimed to find the
relationship between nutrient needs , the type of feeding for the diabetic child
and his physical growth ( weight and height ) .
The study includes 50 diabetic children , (28) females and (22) males who
came to the National Diabetes Center – AL-mustansiriya University for making
term tests during the period from April 2009 to January 2010 .Their ages
ranged from 3 to13 years ,personal information were collected by a
questionnaire , weight and height were recorded and blood sample were
t
The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since
... Show MoreBanks are considered the main basis of financial sector ,so they must be submitted to sound and strict regulatory system and so as to ensure their operations and according to instructions and regulations , in order to maintain the integrity of the banking sector and financial sector in general .One of the importance regulatory tools that are adopted by the Iraqi Central Bank to control over the banks an financial and periodic statements that are provided by the banks in accordance with planned schedules .The financial statements of the banks must reflect clearly and accurately financial situation and the result of their activities during the period in which they represent to achiveing its purposes.So it has the goal of Search is statemen
... Show MoreThe question on affine Riesz basis of Walsh affine systems is considered. An affine Riesz basis is constructed, generated by a continuous periodic function that belongs to the space on the real line, which has a derivative almost everywhere; in connection with the construction of this example, we note that the functions of the classical Walsh system suffer a discontinuity and their derivatives almost vanish everywhere. A method of regularization (improvement of differential properties) of the generating function of Walsh affine system is proposed, and a criterion for an affine Riesz basis for a regularized generating function that can be represented as a sum of a series in the Rademacher system is obtained.
The estimation of the stressÙ€ strength reliability of Invers Kumaraswamy distribution will be introduced in this paper based on the maximum likelihood, moment and shrinkage methods. The mean squared error has been used to compare among proposed estimators. Also a Monte Carlo simulation study is conducted to investigate the performance of the proposed methods in this paper.
Management Representations Letter plays a significant role as an evidence to get conclusions the Auditor is looking for. These conclusions could show the professional opinion of auditor over the fairness and integrity of financial statements for many issues and numbers that management claims, Hereby, the research aims at highlighting the importance of Management Representations Letter and the way of using as an evidence with expressing its meaning and means of application in addition to identify the Responsibility of Auditor on that Letter, This research discusses also the effect of Management Representations Letter on the credibility of financial statement and enhancing the credibility of the submitted reports, From other side, in the t
... Show MoreIn this paper, we study a single stress-strength reliability system , where Ƹ and ƴ are independently Exponentiated q-Exponential distribution. There are a few traditional estimating approaches that are derived, namely maximum likelihood estimation (MLE) and the Bayes (BE) estimators of R. A wide mainframe simulation is used to compare the performance of the proposed estimators using MATLAB program. A simulation study show that the Bayesian estimator is the best estimator than other estimation method under consideration using two criteria such as the “mean squares error (MSE)” and “mean absolutely error (MAPE)”.
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More