Preferred Language
Articles
/
ijs-8357
Inference for Generalized Inverted Exponential Distribution UnderProgressive Type-I Interval Censored Data
...Show More Authors

This article discusses the estimation methods for parameters of a generalized inverted exponential distribution with different estimation methods by using Progressive type-I interval censored data. In addition to conventional maximum likelihood estimation, the mid-point method, probability plot method and method of moments are suggested for parameter estimation. To get maximum likelihood estimates, we utilize the Newton-Raphson, expectation -maximization and stochastic expectation-maximization methods. Furthermore, the approximate confidence intervals for the parameters are obtained via the inverse of the observed information matrix. The Monte Carlo simulations are used to introduce numerical comparisons of the proposed estimators. In addition, we use the percentile bootstrapping technique that is used to calculate confidence intervals. The proposed methodology in a real-life using the survival times of guinea pigs inoculated with different doses of tubercle bacilli data are considered to offer the applicability of the suggested methods.

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Efficiently-managed Cloudly-Secured Mobile User Data Sharing Code Implementation
...Show More Authors

Increasing Mobile Device on Cloud Technology will dominate the various industries. Cloud has different data storage and data protecting techniques that based on Data User (DU) and industry’s needs. In this paper, an efficient way of managing user data sharing via Mobile Agent (MA) also called Mobile Proxy (MP) is proposed. The role of Mobile Agent Authorize User to collect the data from Cloud like Proxy and supply data to another Client due to this missing of cloud data is not possible. Instead of access data for all clients, the proxy hold required data and share the customer because of this network reliability, Network Bandwidth, User Congestion, Data Security. Also, this proposed scheme have more functionality like Cloud Authen

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Development prediction algorithm of vehicle travel time based traffic data
...Show More Authors

This work bases on encouraging a generous and conceivable estimation for modified an algorithm for vehicle travel times on a highway from the eliminated traffic information using set aside camera image groupings. The strategy for the assessment of vehicle travel times relies upon the distinctive verification of traffic state. The particular vehicle velocities are gotten from acknowledged vehicle positions in two persistent images by working out the distance covered all through elapsed past time doing mollification between the removed traffic flow data and cultivating a plan to unequivocally predict vehicle travel times. Erbil road data base is used to recognize road locales around road segments which are projected into the commended camera

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Apr 01 2016
Journal Name
Gis Research Uk 24th Annual Conference
Comparing Open Source Map Data in Areas Lacking Authoritative Mapping
...Show More Authors

One wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.

Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Application of Data Mining Techniques on Tourist Expenses in Malaysia
...Show More Authors

Tourism plays an important role in Malaysia’s economic development as it can boost business opportunity in its surrounding economic. By apply data mining on tourism data for predicting the area of business opportunity is a good choice. Data mining is the process that takes data as input and produces outputs knowledge. Due to the population of travelling in Asia country has increased in these few years. Many entrepreneurs start their owns business but there are some problems such as wrongly invest in the business fields and bad services quality which affected their business income. The objective of this paper is to use data mining technology to meet the business needs and customer needs of tourism enterprises and find the most effective

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
...Show More Authors

With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques using various effective algorithms. Lots of algorithms and techniques are available for data security.  This paper presents a cryptosystem that combines several Substitution Cipher Algorithms along with the Circular queue data structure. The two different substitution techniques are; Homophonic Substitution Cipher and Polyalphabetic Substitution Cipher in which they merged in a single circular queue with four different keys for each of them, which produces eight different outputs for

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Gene frequency and haplotype analysis of HLA class I in patients with simple renal cysts
...Show More Authors

Background: The study of human leukocytes (HLA) alleles, and haplotype frequencies within populations provide an important source of information for anthropological investigation, organ and hematopoietic stem cell transplantation as well as disease association, certain diseases showed association with specific alleles specially those of known or suspected hereditary origin or immunological basis, whether simple renal cyst is congenital or acquired is still unclear and need to be investigated.Objectives: To study the genetic aspect of simple renal cysts by detecting the gene frequency and the haplotype of HLA class I of patients with simple renal cysts, and to find the presence of these cysts in other family members.Method: Thirty patient

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Materials Today: Proceedings
Investigating the elastic and plastic behavior of I-steel beams by using carbon fiber laminates
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Serviceability behavior of High Strength Concrete I-beams reinforced with Carbon Fiber Reinforced Polymer bars
...Show More Authors

Fiber Reinforced Polymer (FRP) bars are anisotropic in nature and have high tensile strength in the fiber direction. The use of High-Strength Concrete (HSC) allows for better use of the high-strength properties of FRP bars. The mechanical properties of FRP bars can yield to large crack widths and deflections. As a result, the design of concrete elements reinforced with FRP materials is often governed by the Serviceability Limit States (SLS). This study investigates the short-term serviceability behavior of FRP RC I-beams. Eight RC I-beams reinforced with carbon-FRP (CFRP) and four steel RC I-beams, for comparison purposes, were tested under two-point loading.
Deformations on the concrete and crack widths and spacing are measured and

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Sep 22 2021
Journal Name
The Structural Design Of Tall And Special Buildings
Utilizing I‐shaped shear links as dampers to improve the behavior of concentrically braced frames
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref