Gumbel distribution was dealt with great care by researchers and statisticians. There are traditional methods to estimate two parameters of Gumbel distribution known as Maximum Likelihood, the Method of Moments and recently the method of re-sampling called (Jackknife). However, these methods suffer from some mathematical difficulties in solving them analytically. Accordingly, there are other non-traditional methods, like the principle of the nearest neighbors, used in computer science especially, artificial intelligence algorithms, including the genetic algorithm, the artificial neural network algorithm, and others that may to be classified as meta-heuristic methods. Moreover, this principle of nearest neighbors has useful statistical features. The objective of this paper is thus to propose a new algorithm where it allows getting the estimation of the parameters of Gumbel probability distribution directly. Furthermore, it overcomes the mathematical difficulties in this matter without need to the derivative of the likelihood function. Taking simulation approach under consideration as empirical experiments where a hybrid method performs optimization of these three traditional methods. In this regard, comparisons have been done between the new proposed method and each pair of the traditional methods mentioned above by efficiency criterion Root of Mean Squared Error (RMSE). As a result, (36) experiments of different combinations of initial values of two parameters (λ: shift parameter and θ: scale parameter) in three values that take four different sample sizes for each experiment. To conclude, the proposed algorithm showed its superiority in all simulation combinations associated with all sample sizes for the two parameters (λ and θ). In addition, the method of Moments was the best in estimating the shift parameter (λ) and the method of Maximum Likelihood was in estimating the scale parameter (θ).
A 3D Geological model was generated using an advanced geostatistical method for the Cretaceous reservoir in the Bai Hassan oil field. In this study, a 3D geological model was built based on data from four wells for the petrophysical property distribution of permeability, porosity, water saturation, and NTG by using Petrel 2021 software. The geological model was divided into a structural model and a property model. The geological structures of the cretaceous reservoir in the Bai Hassan oil field represent elongated anticline folds with two faults, which had been clarified in the 3D Structural model. Thirteen formations represent the Cretaceous reservoir which includes (Shiranish, Mashurah, U.kometan, Kometan Shale, L. Kometan, Gulnen
... Show MoreIt's challenging to help EFL students in Iraq learn and use synonyms. This study investigates the challenges faced by Iraqi English as a Foreign Language (EFL) students in understanding and employing synonyms. By employing Langacker's cognitive linguistic theory of domains, the research aims to enhance EFL Iraqi students' synonym knowledge and vocabulary acquisition. The study utilizes a descriptive analysis technique, with a pre-test and post-test design, involving fifty first-year students at the University of Baghdad's College of Languages, Department of English. The findings reveal that the domain theory significantly improved students' comprehension and application of English word semantics. Prior to the intervention, students
... Show More|
Woman is the first target of social advertising, because most of these advertisements are primarily belong to them. This paper which is entitled "Social Responsibility for the Employment of Woman in Sustainable Development Declarations, An Analytical Study of Road Advertising in Baghdad" focuses on the use of woman in advertising. This aspect shows that some people see that advertisement is a mirror to what’s found in society such as woman’s behaviors in her everyday life and so on, while other people see that as long as the public wants those advertisings, they are free to choose what they prefer. They think that the shameful advertisements are natural and unavoidable. These vie |
The subject of this research involves studying adsorption to removal herbicide Atlantis WG from aqueous solutions by bentonite clay. The equilibrium concentration have been determined spectra photometry by using UV-Vis spectrophotometer. The experimental equilibrium sorption data were analyzed by two widely, Langmuir and Freundlish isotherm models. The Langmuir model gave a better fit than Freundlich model The adsorption amount of (Atlantis WG) increased when the temperature and pH decreased. The thermodynamic parameters like ?G, ?H, and ?S have been calculated from the effect of temperature on adsorption process, is exothermic. The kinetic of adsorption process was studied depending on Lagergren ,Morris ? Weber and Rauschenberg equati
... Show MoreIn this work we prepared some schiff bases by condensation urea and benzaldehyde or its derevative ( bromo benzaldehyde or hydroxy benzaldehyde ) as ( 1 : 1 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A1 , B1 , C1 , D1 , E1 , F1 , G1 ) and ( 1 : 2 ) mole ( urea : benzaldehyde or its substitution ) to prepare compounds ( A2 , B2 , C2 , D2 , E1 , F2 , G2 ) . The prepared compounds identified spectroscopic by infrared spectroscopy FT-IR and Thin layer chromotography T.L.C . The force constant calculated from the wave number for the carbonyl stretching from FT-IR chart and by using the following equation K = 4?2C2?'2? The change in double bond order for carbonyl deteremined in according with some past re
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show Moren this paper, we formulate three mathematical models using spline functions, such as linear, quadratic and cubic functions to approximate the mathematical model for incoming water to some dams. We will implement this model on dams of both rivers; dams on the Tigris are Mosul and Amara while dams on the Euphrates are Hadetha and Al-Hindya.