Preferred Language
Articles
/
jeasiq-320
Proposed Entropy Loss function and application to find Bayesian estimator for Exponential distribution parameter
...Show More Authors

The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial values for the parameters  and initial value b, to get to estimator balanced add between two loss function ,moreover, the optimal sample size determination under proposed entropy loss function.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 30 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of gender, age and tooth loss on the dimensions of incisive canal, and buccal bone anterior to the canal (Computed Tomography study)
...Show More Authors

Background: The incisive canal is an anatomical structure with an important location in the anterior maxilla, analyzing this canal and its relation to the bone anterior to the canal is necessary during dental implant. Aim of this study is evaluated effect of gender, age and tooth loss in area of maxillary central incisors teeth on the dimensions of incisive canal and buccal bone anterior to the canal using spiral computed tomography. Materials and Methods: Sample consists of prospective study for 156 subjects for both gender, they divided into two groups, 120 dentate group (60 male and 60 female) with age ranging from (20-70) and 36 edentate group (with missing maxillary central incisors) (18 male and 18 female) with age ranging from (50-70

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Scienceasia
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator
...Show More Authors

In this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Response of Local rice cultivar to Zinc and Boron application
...Show More Authors

Five levels of Zn-EDTA fertilizer and foliar application of boron were used to study the local rice response through studying of some vegetative and reproductive growth characters, by conducting two field experiments at Kanipanka Agricultural Research Station during the summer season of 2004 by using RCBD with three replications. Significant differences were found in studied characters, there were increase in the number of days from seeding to 50% flowering (94.330-96.233) days, from 50% flowering to physiological maturity (37.50-38.28) days, plant height (82.50-91.423) cm and LAI (5.441-7.525). Reproductive characters such as number of grains panicle-1 (74.11-85.88), number of panicles m-2 (321.00-426.083), biological yield (8166.166-11082

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 17 2015
Journal Name
مجلة ميسان لعلوم التربية البدنية
Volume loss from Antarctic ice shelves is accelerating
...Show More Authors
Disappearing faster around the edges<p>The floating ice shelves around Antarctica, which buttress ice streams from the continent and slow their discharge into the sea, are thinning at faster rates. Paolo<italic>et al.</italic>present satellite data showing that ice shelves in many regions around the edge of the continent are losing mass. This result increases concern about how fast sea level might rise as climate continues to warm. If warming continues to cause ice shelves to thin, as they have for the past couple of decades, their disappearance may allow land-based ice to collapse and melt.</p><p><italic>Science</italic>, this issue p.<related-article xmlns:xlink="http://www."></related-article></p> ... Show More
View Publication
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
The Structural systems and expressional function for Airport Terminals' buildings
...Show More Authors

The research deals with the structures of the contemporary travelers' buildings in particular, and which is a functional complex installations where flexibility, technical and stereotypes play an important role as well as the human values These facilities must represent physiological and psychological comfort for travelers. TThose are facilities where architectural form plays a distinguished role in reversing the specialty and identity of the building. Hence the importance of the subject has been in forced, as a result for the need to study these facilities and to determine the impact and affects by the surrounding environment, to the extent of the urban, environmental, urban, social, and psychological levels. The importance of the resea

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Proposed Audit Program for Automated Clearing House System (ACH)
...Show More Authors

إن استخدام النظم الالكترونية في القطاع المصرفي وبالخصوص نظام مقاصة الصكوك الالكترونية (ACH) في عمليات التحويل الالكتروني للاموال بين المصارف تتضمن تحويلات مالية عالية القيمة  بين  المصارف المشاركة بهذا النظام, وان اي خلل قد يحدث بالنظام يؤدي الى حالات تلاعب في مقاصة الصكوك الالكترونية في المصارف المشاركة وبالتالي حدوث عملية اختلاس, ومن هذا المنطلق تبرز مشكلة البحث في اهمية توافر برنامج تدقيق مقترح ياخ

... Show More
View Publication
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Proceedings Of 2011 International Conference On Computer Science And Network Technology
A new proposed handoff scheme for mobile communication systems
...Show More Authors

There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s

... Show More
View Publication
Crossref (1)
Scopus Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Evaluation Age and Gender for General Census of the population in Iraq by using nonparametric Bayesian Kernel Estimators
...Show More Authors

The process of evaluating data (age and the gender structure) is one of the important factors that help any country to draw plans and programs for the future. Discussed the errors in population data for the census of Iraqi population of 1997. targeted correct and revised to serve the purposes of planning. which will be smoothing the population databy using nonparametric regression estimator (Nadaraya-Watson estimator) This estimator depends on bandwidth (h) which can be calculate it by two ways of using Bayesian method, the first when observations distribution is Lognormal Kernel and the second is when observations distribution is Normal Kernel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Proposed method to estimate missing values in Non - Parametric multiple regression model
...Show More Authors

In this paper, we will provide a proposed method to estimate missing values for the Explanatory variables for Non-Parametric Multiple Regression Model and compare it with the Imputation Arithmetic mean Method, The basis of the idea of this method was based on how to employ the causal relationship between the variables in finding an efficient estimate of the missing value, we rely on the use of the Kernel estimate by Nadaraya – Watson Estimator , and on Least Squared Cross Validation (LSCV) to estimate the Bandwidth, and we use the simulation study to compare between the two methods.

 

View Publication Preview PDF
Crossref