Preferred Language
Articles
/
jeasiq-1012
Comparison of BASE methods with other methods for estimating the measurement parameter for WEBB distribution using simulations
...Show More Authors

  Weibull distribution is considered as one of the most widely  distribution applied in real life, Its similar to normal distribution in the way of applications, it's also considered as one of the distributions that can applied in many fields such as industrial engineering to represent replaced and manufacturing time ,weather forecasting, and other scientific uses in reliability studies and survival function in medical and communication engineering fields.

   In this paper, The scale parameter has been estimated for weibull distribution using Bayesian method based on Jeffery prior information as a first method , then enhanced by improving Jeffery prior information and then used as a second method ,moreover another Bayesian method has been suggested based on Jeffery's method also, then a comparison between Bayesian methods with other methods (Maximum likelihood estimator, Moment ,least squares) has been made and then applied using supposed shape parameters, scale parameter , and constant  c ,sample sizes (10,20,30,50,100) Finally the results showed the superiority of Maximum likelihood ,While the second best estimation method bounced between the first and second Bayes method and Moments method.

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
Using jack knife to estimation logistic regression model for Breast cancer disease
...Show More Authors

 

It is considered as one of the statistical methods used to describe and estimate the relationship between randomness (Y) and explanatory variables (X). The second is the homogeneity of the variance, in which the dependent variable is a binary response takes two values  (One when a specific event occurred and zero when that event did not happen) such as (injured and uninjured, married and unmarried) and that a large number of explanatory variables led to the emergence of the problem of linear multiplicity that makes the estimates inaccurate, and the method of greatest possibility and the method of declination of the letter was used in estimating A double-response logistic regression model by adopting the Jackna

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The adequacy of the methods used in the collection of tax debt in Iraq: Applied research in the General Authority for Taxation
...Show More Authors

If the sovereignty of the state is reflected in the taxation of its citizens, this sovereignty can not be completed and completed only if it works on its part to collect its debts, whether voluntary or compulsory, and the debt of the debt arises from the will of the individual and the will of the state alone, The existing management of seizure and collection is based on an unequal relationship between the State and the debtor from which the obligation arises. Naturally, this relationship has obligations and rights on both parties. The researcher used a set of studies and previous research, books and other sources related to the subject of research. This was done through the theoretical and practical aspects, which focused on direct and i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Methods To Prevent SQL Injection
...Show More Authors

  In the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack.     SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input  such as form  and then include this input in database requests, typically SQL statements in a way that was not intende

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Synthesis, Spectroscopy of New Lanthanide Complexes with Schiff Base Derived From (4-Antipyrinecarboxaldehyde with Ethylene Di-Amine) and Study the Bioactivity
...Show More Authors

The study involved preparing a new compound by combining Schiff bases generated from compounds for antipyrine, including lanthanide ions (lanthanum, neodymium, erbium, gadolinium, and dysprosium). The preparation of the ligand from condensation reactions (4-antipyrinecarboxaldehyde with ethylene di-amine) at room temperature, and was characterization using spectroscopic and analytical studies ( FT-IR, UV-visible spectra, 1H-NMR, mass spectrometry, (C.H.N.O), thermogravimetric analysis (TGA), in addition to the magnetic susceptibility and conductivity measurement of the synthesis complexes, among the results we obtained from the tests, we showed that the ligand behaves with the (triple Valence) lanthanide ions, the multidentate

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Computer Sciences And Informatics
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss

... Show More
View Publication
Crossref
Publication Date
Wed May 01 2019
Journal Name
Iop Conf. Series: Materials Science And Engineering
Fire flame effect on the compressive strength of reactive powder concrete using different methods of cooling
...Show More Authors

This research foxed on the effect of fire flame of different burning temperatures (300, 400 and 500)oC on the compressive strength of reactive powder concrete (RPC).The steady state duration of the burning test was (60)min. Local consuming material were used to mixed a RPC of compressive strength around (100) MPa. The tested specimens were reinforced by (3.0) cm hooked end steel fiber of (1100) MPa yield strength. Three steel fiber volume fraction were adopted in this study (0, 1.0and 1.5)% and two cooling process were included, gradual and sudden. It was concluding that increasing burning temperature decreases the residual compressive strength for RPC specimens of(0%) steel fiber volume fraction by (12.16, 19.46&24.49) and (18.20, 27.77 &3

... Show More
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2023
Journal Name
International Journal Of Revolution In Science And Humanity
Nonparametric Estimation of Failure Periods for Log Normal Distribution Using Bootstra
...Show More Authors

A non-parametric kernel method with Bootstrap technology was used to estimate the confidence intervals of the system failure function of the log-normal distribution trace data. These are the times of failure of the machines of the spinning department of the weaving company in Wasit Governorate. Estimating the failure function in a parametric way represented by the method of the maximum likelihood estimator (MLE). The comparison between the parametric and non-parametric methods was done by using the average of Squares Error (MES) criterion. It has been noted the efficiency of the nonparametric methods based on Bootstrap compared to the parametric method. It was also noted that the curve estimation is more realistic and appropriate for the re

... Show More
View Publication
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Educational And Psychological Researches
Teaching methods approved in the university and its relationship to classroom discipline and management proposals treated
...Show More Authors

The study aims detection teaching modalities adopted relationship in Jerash University exactly the classroom, and to achieve the goal of the study was to develop a questionnaire consisting of (39) items, and was achieving validity and reliability have, then sent to a sample of professors made up the university from (122) university professor of the total (172) professor, and they study population.

     Study found a relationship between the teaching methods of the four their strategies with classroom management, and as a result the overall average level, while Hspt critical thinking at the highest correlation with classroom discipline management relationship strategy, while the relatio

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 03 2013
Journal Name
Baghdad Science Journal
Satellite Images Unsupervised Classification Using Two Methods Fast Otsu and K-means
...Show More Authors