Preferred Language
Articles
/
jeasiq-2212
Comparison Between Nelson-Olson Method and Two-Stage Limited Dependent Variables (2SLDV ) Method for the Estimation of a Simultaneous Equations System (Tobit Model)

This study relates to  the estimation of  a simultaneous equations system for the Tobit model where the dependent variables  ( )  are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods  different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method  and  Two- Stage limited dependent variables(2SLDV) method  to get of estimators that hold characteristics the good estimator .

That is , parameters will be estimated for the limited variables and find the variance-covariance  matrix for extracted estimators  by  the  aforementioned two methods and then compare between the results of the two methods and find any better method by estimation and then finding the estimation efficiency, and this is what the study aims to .

A simultaneous equations system will be imposed for the limited model defined by two equations containing  two endogenous variables one of complete observations and the other censored at zero.   

The two methods were used to analyze the relationship between income and family expenditure on durable consumer goods , where the results showed that the performance of (Nelson-Olson) method is better than performing the Two-Stage limited dependent variables (2SLDV) method in obtain the lower values and all comparison measures as well as the results showed that income and expenditure   one affects the other and the  

  and the price affects the income and expenditure

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Safety Science
Scopus (34)
Crossref (30)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Oct 01 2017
Journal Name
International Journal Of Oral And Maxillofacial Surgery
Characteristics of mandibular injuries caused by bullets and improvised explosive devices: a comparative study

The purpose of this study was to investigate the difference in mandibular trauma caused by two mechanisms for the delivery of missile injuries: firearms and improvised explosive devices (IEDs). The data investigated included sex, age, mechanism of injury, and other clinical and radiographic manifestations. Seventy consecutive patients, predominantly male, with a mean age of 28.6 ± 14 years (range 2–60 years) were enrolled: 38 patients (54.3%) sustained mandibular fractures caused by bullet injuries and 32 patients (45.7%) had mandibular fractures caused by IED explosion injuries. The study revealed that the differences in most of the investigated variables were not statistically significant; the only significant differences were the inci

... Show More
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Mar 08 2022
Journal Name
Chemical Biology & Drug Design
SARS‐CoV‐2 and its variants of concern including Omicron: A never ending pandemic
Abstract<p>The ongoing COVID‐19 pandemic caused by SARS‐CoV‐2 is associated with high morbidity and mortality. This zoonotic virus has emerged in Wuhan of China in December 2019 from bats and pangolins probably and continuing the human‐to‐human transmission globally since last two years. As there is no efficient approved treatment, a number of vaccines were developed at an unprecedented speed to counter the pandemic. Moreover, vaccine hesitancy is observed that may be another possible reason for this never ending pandemic. In the meantime, several variants and mutations were identified and causing multiple waves globally. Now the safety and efficacy of these vaccines are debatable and recommended to d</p> ... Show More
Scopus (38)
Crossref (39)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
Crossref (1)
Scopus Clarivate Crossref
View Publication
Publication Date
Fri Mar 01 2013
Journal Name
Zanco Journal Of Medical Sciences
Epidemiology of viral hepatitis B and C in Iraq: a national survey 2005-2006

Background and objective: Viral Hepatitis Type B&C is serious public health challenge throughout the world.Hepatitis B and C viruses still remain to be the major causes of chronic hepatitis.It is estimated that around 350-400 million people in the world are chronic carriers of HBV, which represents approximately 7% of the total populationwhereas infection with HCV is found in approximately 3% of the world population, which represents 160 million people. Hepatitis B infection has a wide range of seroprevalence in the Mediterranean countries ranging from intermediate (=>2% ) to high prevalence ( =>7%). World Health Organization estimated a prevalence rate for HCV infection of about 4.6% in Eastern Mediterranean in 1999. During the eightieths

... Show More
Crossref (18)
Crossref
View Publication
Publication Date
Sun Oct 01 2023
Journal Name
Journal Of Surgical Case Reports
Agenesis of flexor pollicis longus without thenar hypoplasia: a case report and literature review
Abstract<p>We present a case of congenital of flexor pollicis longus agenesis without thenar hypoplasia in a 12-year-old girl with no history of trauma. Two-staged corrective surgery was planned. In the first stage, the flexor pulley was reconstructed using silicone followed by the second stage 3 months later when flexor pollicis longus reconstruction was performed using tendon transfer of the flexor digitorum superficialis. The patient completed post-operative physiotherapy and the result of the surgical treatment in both functional and cosmetic aspects was, in the authors’ opinion, excellent.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the tax examiner's procedures in increasing or decreasing tax revenue : Applied research in the General Authority for Taxes

Abstract:

               The tax is one of the elements of the general revenues of the state and contributes to covering its expenses. Taxes are imposed in most countries of the world. The tax proceeds depend on a set of factors that contribute either positively or negatively to the tax share by increasing or decreasing it. Therefore, the research aims to demonstrate the role of the tax examiner's procedures in achieving the validity of the taxable base and its reflection on the tax proceeds, as well as reviewing the tax examiner's procedures related to the tax return process. Examination and tax audit of the financial statements, as well as presenting the financial statements to an independent and i

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of tax techniques on the quality of services provided to income taxpayers: An exploratory study in a sample of the branches of the General Tax Authority / Baghdad Governorate

The research aims to demonstrate the impact of tax techniques on the quality of services provided to income taxpayers by studying the correlational and influencing relationships between the exploited variable (tax techniques) and the dependent variable (the quality of services provided to income taxpayers), and in line with the research objectives, the main hypothesis of the research was formulated (there is a relationship Significance between tax techniques and the quality of services provided to income taxpayers) a number of sub-hypotheses emerged from this hypothesis that were stated in the research methodology, and a number of conclusions were reached, the most important of which were (through the use of the correlation coeff

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 30 2023
Journal Name
Iraqi Journal Of Science
Using Retrieved Sources for Semantic and Lexical Plagiarism Detection

     Plagiarism is described as using someone else's ideas or work without their permission. Using lexical and semantic text similarity notions, this paper presents a plagiarism detection system for examining suspicious texts against available sources on the Web. The user can upload suspicious files in pdf or docx formats. The system will search three popular search engines for the source text (Google, Bing, and Yahoo) and try to identify the top five results for each search engine on the first retrieved page. The corpus is made up of the downloaded files and scraped web page text of the search engines' results. The corpus text and suspicious documents will then be encoded as vectors. For lexical plagiarism detection, the system will

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Nov 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Proposed emerged and enhanced routing protocols for wireless networks

The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref