Preferred Language
Articles
/
xBdleo4BVTCNdQwCYEnd
Analyzing Skewed Data with the Epsilon Skew Gamma distribution
...Show More Authors

A new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution

Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The impact of political thinking on the decision maker in analyzing the strategic environment of the state (applied study in the Iraqi Ministry of Finance)
...Show More Authors

The Political Thinking Regarded as an important element for the formulation of the stat, weather in its formation, the structure of it s entity, its political system and it s governmental instruments .The political thinking can not act without determined strategy, So they intend to work hard to formulate a railed strategy that make them able to determine its  directions to general issues.

   The Study aimed to solve the problem through the following question:

1- What are the levels of Political Thinking and Strategic Analysis in the financial ministry?

2- What are the relation ship between the dimensions of Political  T

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Gulf Economist
The Bayesian Estimation in Competing Risks Analysis for Discrete Survival Data under Dynamic Methodology with Application to Dialysis Patients in Basra/ Iraq
...Show More Authors

Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 14 2024
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
Using Nonparametric Procedure to Develop an OCMT Estimator for Big Data Linear Regression Model with Application Chemical Pollution in the Tigris River
...Show More Authors

Chemical pollution is a very important issue that people suffer from and it often affects the nature of health of society and the future of the health of future generations. Consequently, it must be considered in order to discover suitable models and find descriptions to predict the performance of it in the forthcoming years. Chemical pollution data in Iraq take a great scope and manifold sources and kinds, which brands it as Big Data that need to be studied using novel statistical methods. The research object on using Proposed Nonparametric Procedure NP Method to develop an (OCMT) test procedure to estimate parameters of linear regression model with large size of data (Big Data) which comprises many indicators associated with chemi

... Show More
View Publication
Crossref
Publication Date
Wed Nov 22 2017
Journal Name
Farm Machinery And Processes Management In Sustainable Agriculture, Ix International Scientific Symposium
TESTING THE UNIFORMITY OF SPRAY DISTRIBUTION UNDER DIFFERENT APPLICATION PARAMETERS
...Show More Authors

View Publication
Crossref (3)
Clarivate Crossref
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The use of the genetic algorithm to estimate the parameters function of the hypoexponential distribution by simulation
...Show More Authors

In this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method

View Publication Preview PDF
Crossref
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of some of reliability and Hazard estimation methods for Rayleigh logarithmic distribution using simulation with application
...Show More Authors

The question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.

In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
On Shrunken Estimation of Generalized Exponential Distribution
...Show More Authors

This paper deal with the estimation of the shape parameter (a) of Generalized Exponential (GE) distribution when the scale parameter (l) is known via preliminary test single stage shrinkage estimator (SSSE) when a prior knowledge (a0) a vailable about the shape parameter as initial value due past experiences as well as suitable region (R) for testing this prior knowledge.

The Expression for the Bias, Mean squared error [MSE] and Relative Efficiency [R.Eff(×)] for the proposed estimator are derived. Numerical results about beha

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Measuring and analyzing the demand function for agricultural imports in Iraq for the period (1980-2012) in Autoregressive Distributed Lag Model(ARDL)
...Show More Authors

Abstract:

The issues related to foreign trade is a broad field for discussions and captures the interest of economists for their contribution to the process of economic development in the economies of the countries, especially developing ones. The imports of goods and services in foreign trade constitute an important part of the local by which the economy gets goods and services that the economy cannot produce because of the incompetent base of production. Further, the demand function of imports occupied a good deal of the attention of researchers in the field of international economics for which agricultural imports constitute an important part. The reason for the interest in the subject is due to its im

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 25 2021
Journal Name
2021 7th International Conference On Contemporary Information Technology And Mathematics (iccitm)
Anomaly Detection in Flight Data Using the Naïve Bayes Classifier
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
The Factors Affecting on Managing Sensitive Data in Cloud Computing
...Show More Authors

Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref