This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different prior distributions are used. Also, the Bayesian estimators concerning the parameters of interest under various loss functions are investigated. The Gibbs sampling algorithm is used to construct the Bayesian credible intervals. Then, the efficiencies of the maximum likelihood estimators are compared with Bayesian estimators via an extensive Monte Carlo simulation study. It has been shown that the Bayesian estimators are considerably more efficient than the maximum likelihood estimators. Finally, a real-life example is also presented for application purposes.
Abstract
This research aims to assess the practice of physical activities by people with intellectual disabilities and its challenges during the Coronavirus (COVID-19) pandemic from their families' point of view. The research sample consisted of (87) individuals from families with intellectual disabilities in the Makkah region. The sample was selected by the simple random method where the researcher used the descriptive analytical approach. A questionnaire of (32) items was used as the research tool to collect data. The findings of the study showed that the assessment level of practicing physical activities by people with intellectual disabilities was low. The public facilities dimension ranked first with a moder
... Show MoreA substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show MoreAt a time when the general rules in the different legal systems require the presence of two parties to the contract, one of which is issued the first expression of the will and is called the offer, and the other is issued from the other and is called the acceptance. A special type of contracts emerged in the beginning of the last century called the “unilateral contracts”. The side sparked a major jurisprudential dispute, as well as the issuance of several contradictory judicial rulings on it. Hence, this research came to highlight this special type of contract. Key words: the definition of a unilateral contract, its distinction from other legal situations, and its effects.
Arabic calligraphy is one of the greatest achievements of Islamic art. The visual form of Arabic calligraphy is the primary means of presenting ideas and messages for expressive communication in Arabic typefaces. Emerging computer technology with calligraphy is essential for effective visual designs; however, traditional typefaces are insufficient in number and quality to fulfill the requirements of the current Saudi industry. Thus, this research investigates the processes followed by graphic designers to create modern Arabic type designs inspired by Arabic calligraphy, and presents the characteristics of Arabic calligraphy. The research implemented a mixed experimental and descriptive method, exploring 10 typefaces designed by professio
... Show More
The logistic regression model of the most important regression models a non-linear which aim getting estimators have a high of efficiency, taking character more advanced in the process of statistical analysis for being a models appropriate form of Binary Data.
Among the problems that appear as a result of the use of some statistical methods I
... Show MoreWe describe the synthesis and characterization of a novel 2D-MnOx material using a combination of HR-TEM, XAS, XRD, and reactivity measurements. The ease with which the 2D material can be made and the conditions under which it can be made implies that water oxidation catalysts previously described as “birnessite-like” (3D) may be better thought of as 2D materials with very limited layer stacking. The distinction between the materials as being “birnessite-like” and “2D” is important because it impacts on our understanding of the function of these materials in the environment and as catalysts. The 2D-MnOx material is noted to be a substantially stronger chemical oxidant than previously noted for other birnessite-like manganese oxi
... Show MoreThe research aims to study and analyze the reality of the internal control system in the company surveyed . To find out how effective and efficient internal control system , problem – centered research that addressed the performance of the internal control system .
The research Description applied and the interview Alchksahvi analysis and interpretation of results . The researchers recommended the need for attention to the training courses and the need for segregation of duties and functions in the main and subsidiary records , taking in to account periodic reconciliations between the lists and financ
... Show MoreIn this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease error
... Show More