Preferred Language
Articles
/
lhdMfJIBVTCNdQwC9LH4
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators

Scopus Clarivate Crossref
View Publication
Publication Date
Sat May 23 2026
Journal Name
Magazine Of College Administration&economics For Economic & Administration & Financial Studies
The Design of Optimal Layout Using Computerized Relative Allocation of Facilities Technique (CRAFT) - Applied Research in Al-M'ammon Factory / The General Company for Vegetable Oils Industry
...Show More Authors

View Publication
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Evaluating Quality of Control Policies and Procedures for Banking Transactions Using the Non-application Gap Model to Enhance Financial Reporting Requirements Applied Study in an Iraqi Private Bank
...Show More Authors

The research aims to enhance the level of evaluation of the performance of banking transactions control policies and procedures. The research is based on the following hypothesis: efficient transactions control policies and procedures contribute enhancing financial reporting, by assessing non-application gap of those policies and procedures in a manner that helps to prevent, discover, and correct material misstatementsThe researchers designed an examination list that includes the control policies and procedures related to the transactions, as a guide to the bank audit program prepared by the Federal Financial Supervision Bureau. The research methodology is

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Aug 07 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis and Characterization of Tetradentate Complexes Type N2O2 From the Reaction of 2-Hydroxy -1, 2-Diphynel-Ethanone Oxime [H2L] With Mn II, Fe II, Co II, Ni II, Cu II and Hg II Ions
...Show More Authors

Tetradentate complexes type [M (HL) 2] were prepared from the reaction of 2-hydroxy -1, 2-diphynel-ethanone oxime [H2L] and KOH with ( Mn II, Fe II, Co II, Ni II , Cu II and Hg II ), in methanol with (2:1) metal: ligand ratio. The general formula for Cu II and Mn II complexes are [M (HL) 2 Cl.H2O] K, for Co II [Co (HL) 2. H2O] and [M (HL) 2] for the rest of complexes. All compounds were characterised by spectroscopic methods, I.R, U.V-Vis, H.P.L.C, atomic absorption and conductivity measurements chloride content. From the data of these measurements, the proposed molecular structures for Fe II and Hg II complexes are tetrahedrals, while Mn II and Cu II complexes are octahedrals, Ni II complex adopting square planar structure and the complex

... Show More
Publication Date
Mon Jul 01 2013
Journal Name
Iraqi Journal Of Agricultural Sciences مجلة العلوم الزراعية العراقية
EFFECT OF HARROW TYPE AND DRILL SEEDER'S SPEEDS AND DEPTHS ON SOME MACHINERY UNIT TECHNICAL, ECONOMICAL AND ENERGY REQUIREMENT INDICATORS تأثير نوع المنعمة وسٌرع وأعماق البذار في بعض المؤشرات الفنية والأقتصادية ومتطلبات القدرة للوحدة الميكنية
...Show More Authors

Publication Date
Mon Dec 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Using Earned Value Method in Project Control Applied research
...Show More Authors

   There is no doubt that the project control function is very important for administration, so the project Management depends on to monitor and control the project. The project control integrated to the planning which is the base of the administration functions; planning, organizing, directing, and controlling. Without project control cannot be insure to fulfill the plan of the project by the budget and specified time. The project management apply many methods of control to achieve the goals of project which are cost, time, and required specifications. Earned Value Management one of control methods that used in the project by international companies.

Earned Value Method is used in the project o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 10 2016
Journal Name
Iraqi Journal Of Science
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water

... Show More
Publication Date
Thu Jul 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Application
Forecasting enhancement using a hodrick-prescott filter
...Show More Authors

: Sound forecasts are essential elements of planning, especially for dealing with seasonality, sudden changes in demand levels, strikes, large fluctuations in the economy, and price-cutting manoeuvres for competition. Forecasting can help decision maker to manage these problems by identifying which technologies are appropriate for their needs. The proposal forecasting model is utilized to extract the trend and cyclical component individually through developing the Hodrick–Prescott filter technique. Then, the fit models of these two real components are estimated to predict the future behaviour of electricity peak load. Accordingly, the optimal model obtained to fit the periodic component is estimated using spectrum analysis and Fourier mod

... Show More
Preview PDF
Scopus
Publication Date
Mon Jan 01 2018
Journal Name
Plant Archives
Schistosomiasis vector control using cucumis melo plantextractswithbioassayexperiment
...Show More Authors

he aim of this study is to get a plant extracts to use it as molluscicides to control the snail vector of Schistosomiasis andfinely control the disease. Laboratory study was performed to compare the molluscicidal activity of leaves and stems extractsof Cucumis melo against Bulinus truncatus snail. The snail B. truncatus was exposed to a serial concentrations of leaves andstems extracts (4000ppm, 5000ppm) in this work. Different effects of the extracts to the snail B. truncatus were recorded.These effects includes death, escaping and imbalance of snail behavior. 96hr-LD50 values of leaves extracts were calculatedfor the doses 4000 and 5000ppm as (76 and 37%) respectively while for stems were (105 and 47%) respectively. We found thatthe snail

... Show More
View Publication
Scopus
Publication Date
Sat Aug 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Text hiding in text using invisible character
...Show More Authors

Steganography can be defined as the art and science of hiding information in the data that could be read by computer. This science cannot recognize stego-cover and the original one whether by eye or by computer when seeing the statistical samples. This paper presents a new method to hide text in text characters. The systematic method uses the structure of invisible character to hide and extract secret texts. The creation of secret message comprises four main stages such using the letter from the original message, selecting the suitable cover text, dividing the cover text into blocks, hiding the secret text using the invisible character and comparing the cover-text and stego-object. This study uses an invisible character (white space

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jun 01 2008
Journal Name
Baghdad Science Journal
The Writer Authentication by Using Syllables Frequency
...Show More Authors

An approach is depended in the recent years to distinguish any author or writer from other by analyzing his writings or essays. This is done by analyzing the syllables of writings of an author. The syllable is composed of two letters; therefore the words of the writing are fragmented to syllables and extract the most frequency syllables to become trait of that author. The research work depend on analyzed the frequency syllables in two cases, the first, when there is a space between the words, the second, when these spaces are ignored. The results is obtained from a program which scan the syllables in the text file, the performance is best in the first case since the sequence of the selected syllables is higher than the same syllables in

... Show More
View Publication Preview PDF
Crossref