This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different prior distributions are used. Also, the Bayesian estimators concerning the parameters of interest under various loss functions are investigated. The Gibbs sampling algorithm is used to construct the Bayesian credible intervals. Then, the efficiencies of the maximum likelihood estimators are compared with Bayesian estimators via an extensive Monte Carlo simulation study. It has been shown that the Bayesian estimators are considerably more efficient than the maximum likelihood estimators. Finally, a real-life example is also presented for application purposes.
This article introduces the concept of finitely null-additive set function relative to the σ– ring and many properties of this concept have been discussed. Furthermore, to introduce and study the notion of finitely weakly null-additive set function relative to the σ– ring as a generalization of some concepts such as measure, countably additive, finitely additive, countably null-additive, countably weakly null-additive and finitely null-additive. As the first result, it has been proved that every finitely null-additive is a finitely weakly null-additive. Finally, the paper introduces a study of the concept of outer measure as a stronger form of finitely weakly null-additive.
A new ligand complexes have been synthesis from reaction of metal ions of Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II), Hg(II), Pd(II) and Pt(II) with schiff base LH. 5-[(2-Hydroxy-naphthalen-1-ylmethylene)-amino]-2-phenyl-2,4-dihydro-pyrazol-3-one, this ligand was characterized by Fourier transform infrared (FTIR), UV-vis, 1H, 13CNMR, and mass spectra. All complexes were characterized by techniques micro analysis C.H.N, UV-vis and FTIR spectral studies, atomic absorption, chloride content, molar conductivity measurements and magnetic susceptibility. The ligand acts as bidentate, coordination through nitrogen atom from azomethin group and deprotonated phenolic oxygen atom. The spectroscopic and analytical measurements showed that
... Show MoreThis research began by explaining its variables and dimensions especially the digital gap, which the authors explained it elaborately beginning with the concept, the reasons blind its emergence of its measurement, and how to treat it. The authors supposed the potentiality of relying on enforcing knowledge in general and the groups suffer from this gap in particular, especially the targeted knowledge to treat its subject.
As enforcing knowledge usually depends on some strategies or choices of organizational orientation among them is learning and training from one side, and communication, as an indicating factor for organizational effectiveness as the authors refer from the other side.
The interest in the intellectual capital and its development is a civilized necessity imposed by the requirements of the times and cannot imagine an advanced society in its potential productivity in poor efficiency of human capital, and features the work environment change permanently, putting the management of financial companies against a constant challenge toward coping with new developments in this changing environment and this is not taken unless owned by these companies qualified human resources and the provision of Culture organizers have, which manifested itself with the research problem by the following two questions:
- Did the intellectual capital value specific financial and
One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,
... Show MoreThe residual limb within the prosthesis, is often subjected to tensile or fatigue stress with varying temperatures. The fatigue stress and temperatures difference which faced by amputee during his daily activities will produces an environmental media for growth of fungi and bacteria in addition to the damage that occurs in the prosthesis which minimizingthe life of the prosthetic limb and causing disconfirm feeling for the amputee.
In this paper, a mechanical and thermal properties of composite materials prosthetic socket made of different lamination for perlon/fiber glass/perlon, are calculated by using tesile test device under varying temperatures ( from 20oC to 60oC), also in this paper a device for measuring rotational bendin
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreThe study seeks to determine the levels of credit structure (independent variable) depending on its components (loans, credit disseminate, other facilities) To get the eight patterns of the structure of bank credit for the purpose of assessing the relationship between changes in levels of each style of structure credit (increase or decrease) and reflected in maximizing the value of the Bank(The adopted a measured variable depending on the approximate equation of simple Tobin's Q) to determine the style that achieves the highest value of the Bank, to take advantage of it in management, planning and control by knowing the strengths and weaknesses of the historical distribution of the facilities . the sample of the
... Show MoreFrom the responses of Imam Abi Zakaria al-Nawawi 676 AH on the grammarians in his commentary on Sahel Muslim
Training has occupied a leading position in a large number of developed and developing countries alike in order to develop the skills of workers in line with the changes and developments of the era, including monitoring compliance in banks, which is one of the most important jobs in banking work to trailing and monitor the bank’s compliance with laws, regulations and instructions in order to achieve its goals Therefore, the problem of this research focuses on the following question: What is the role of training in enhancing banking compliance at the present time? In order to clarify the relationship between the main and sub-research variables, two main hypotheses and three sub-hypotheses were formulated for each hypothesis, and t
... Show More