Preferred Language
Articles
/
ijs-11629
Bayesian Analysis of five Exponentiated Distributions under different Priors and loss functions

The paper is concerned with posterior analysis of five exponentiated (Weibull, Exponential, Inverted Weibull, Pareto, Gumbel) distrebutions. The expressions for Bayes estimators of the shape parameters have been derived under four different prior distributions assuming four different loss functions. The posterior predictive distributions have been obtained, and the comparison between estimators made by using the mean squared errors through generated different sample sizes by using simulation technique. In general, the performance of estimators under Chi-square prior using squared error loss function is the best.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 24 2022
Journal Name
Iraqi Journal Of Science
Compression of Astronomical Image Using Five Modulus Method

The computer vision branch of the artificial intelligence field is concerned with
developing algorithms for analyzing image content. Data may be compressed by
reducing the redundancy in the original data, but this makes the data have more
errors. In this paper image compression based on a new method that has been
created for image compression which is called Five Modulus Method (FMM). The
new method consists of converting each pixel value in an (4x4, 8×8,16x16) block
into a multiple of 5 for each of the R, G and B arrays. After that, the new values
could be divided by 5 to get new values which are 6-bit length for each pixel and it
is less in storage space than the original value which is 8-bits.

View Publication Preview PDF
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Employ Shrinkage Estimation Technique for the Reliability System in Stress-Strength Models: special case of Exponentiated Family Distribution

       A reliability system of the multi-component stress-strength model R(s,k) will be considered in the present paper ,when the stress and strength are independent and non-identically distribution have the Exponentiated Family Distribution(FED) with the unknown  shape parameter α and known scale parameter λ  equal to two and parameter θ equal to three. Different estimation methods of R(s,k) were introduced corresponding to Maximum likelihood and Shrinkage estimators. Comparisons among the suggested estimators were prepared depending on simulation established on mean squared error (MSE) criteria.

Crossref
View Publication Preview PDF
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Comparative Analysis of Various Multicarrier Modulation Techniques for Different Multilevel Converters

The applications of Multilevel Converter (MLC) are increased because of the huge demand for clean power; especially these types of converters are compatible with the renewable energy sources. In addition, these new types of converters have the capability of high voltage and high power operation. A Nine-level converter in three modes of implementation; Diode Clamped-MLC (DC-MLC), Capacitor Clamped-MLC (CC-MLC), and the Modular Structured-MLC (MS-MLC) are analyzed and simulated in this paper. Various types of Multicarrier Modulation Techniques (MMTs) (Level shifted (LS), and Phase shifted (PS)) are used for operating the proposed Nine level - MLCs. Matlab/Simulink environment is used for the simulation, extracting, and ana

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
Crossref (4)
Crossref
View Publication Preview PDF
Publication Date
Sun Jun 27 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of Quality of Nursing Care Services Provided to Children under Five Years Based on Integrated Management of Child Health at Primary Health Care Centers in Baquba City

Objective(s): The study aims to evaluating the quality of nursing care provided to children under five years to compare between quality related to type of health sectors; to determine the quality of nursing care and to compare between such care in Baquba Health Care Sector I and II.

Methodology: A descriptive study is carried out for the period from December 15th 2019 to May 1st 2020. A purposive "non- probability" sample, of (60) staff nurse and (60) children is selected. An adopted questionnaire has been selected for the study which consists of three parts. The first part is nurses’ socio-demographic characteristic; the second part is ch

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 31 2017
Journal Name
Pramana
Matter density distributions and elastic form factors of some two-neutron halo nuclei

The Skyrme–Hartree–Fock (SHF) method with MSK7 Skyrme parameter has been used to investigate the ground-state properties for two-neutron halo nuclei 6He, 11Li, 12Be and 14Be. These ground-state properties include the proton, neutron and matter density distributions, the corresponding rms radii, the binding energy per nucleon and the charge form factors. These calculations clearly reveal the long tail characterizing the halo nuclei as a distinctive feature.

Scopus (14)
Crossref (11)
Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the Shapiro-Wilk test Jureckova test using simulation and multiple distributions

 إن المقصود باختبارات حسن المطابقة هو التحقق من فرضية العدم القائمة على تطابق مشاهدات أية عينة تحت الدراسة لتوزيع احتمالي معين وترد مثل هكذا حالات في التطبيق العملي بكثرة وفي كافة المجالات وعلى الأخص بحوث علم الوراثة والبحوث الطبية والبحوث الحياتية ,عندما اقترح كلا من   Shapiro والعالم Wilk  عام 1965 اختبار حسن المطابقة الحدسي مع معالم القياس
(

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Feb 03 2021
Journal Name
Structural Concrete
Scopus (12)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A comparison among Different Methods for Estimating Regression Parameters with Autocorrelation Problem under Exponentially Distributed Error

Multiple linear regressions are concerned with studying and analyzing the relationship between the dependent variable and a set of explanatory variables. From this relationship the values of variables are predicted. In this paper the multiple linear regression model and three covariates were studied in the presence of the problem of auto-correlation of errors when the random error distributed the distribution of exponential. Three methods were compared (general least squares, M robust, and Laplace robust method). We have employed the simulation studies and calculated the statistical standard mean squares error with sample sizes (15, 30, 60, 100). Further we applied the best method on the real experiment data representing the varieties of

... Show More
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Spam Filtering based on Naïve Bayesian with Information Gain and Ant Colony System

This research introduces a proposed hybrid Spam Filtering System (SFS) which consists of Ant Colony System (ACS), information gain (IG) and Naïve Bayesian (NB). The aim of the proposed hybrid spam filtering is to classify the e-mails with high accuracy. The hybrid spam filtering consists of three consequence stages. In the first stage, the information gain (IG) for each attributes (i.e. weight for each feature) is computed. Then, the Ant Colony System algorithm selects the best features that the most intrinsic correlated attributes in classification. Finally, the third stage is dedicated to classify the e-mail using Naïve Bayesian (NB) algorithm. The experiment is conducted on spambase dataset. The result shows that the accuracy of NB

... Show More
View Publication Preview PDF