Advanced Search
Displaying 1-10 on page 1 of 447. Per Page  
  • Inference on Generalized Inverse-Pareto Distribution under Complete and Censored Samples
  • Abstract In this paper, the estimation of the parameters of extended Marshall-Olkin inverse-Pareto (EMOIP) distribution is studied under complete and censored samples. Five classical methods of estimation are adopted to estimate the parameters of the EMOIP distribution from complete samples. These classical estimators include the percentiles estimators, maximum likelihood estimators, least squares estimators, maximum product spacing estimators, and weighted least-squares estimators. The likelihood estimators of the parameters under type-I and type-II censoring schemes are discussed. Simulation results were conducted, for various parameter combinations and different sample sizes, to compare the performance of the EMOIP estimation methods under complete and censored samples.…
  • More
  •   Views:119       Downloads:94        Download PDF
  • Inference of Truncated Lomax Inverse Lomax Distribution with Applications
  • Abstract This paper introduces a modified form of the inverse Lomax distribution which offers more flexibility for modeling lifetime data. The new three-parameter model is provided as a member of the truncated Lomax-G procedure. The new modified distribution is called the truncated Lomax inverse Lomax distribution. The density of the new model can be represented as a linear combination of the inverse Lomax distribution. Expansions for quantile function, moment generating function, probability weighted moments, ordinary moments, incomplete moments, inverse moments, conditional moments, and Rényi entropy measure are investigated. The new distribution is capable of monotonically increasing, decreasing, reversed J-shaped and upside-down…
  • More
  •   Views:200       Downloads:100        Download PDF
  • An Efficient Utilization of Blackboard Ally in Higher Education Institution
  • Abstract Without the constraints of time and place, e-learning can offer a strong learning environment. The notion of e-learning has taken on a new sense with the advent and popularization of mobile devices and ubiquitous computing, enabling students to have access to several diverse opportunities for communicating with e-learning programs. Around the same time, it has prompted the course’s planners to select the most suitable technology from among the various innovations required for the storing and dissemination of information representation. As a Learning Management System (LMS), the Blackboard system now has a recognized role in the knowledge management of the education…
  • More
  •   Views:190       Downloads:128        Download PDF
  • Spatiotemporal Characteristics of Traffic Accidents in China, 2016–2019
  • Abstract This study analyzed in-depth investigation reports for 418 traffic accidents with at least five deaths (TALFDs) in China from 2016 to 2019. Statistical analysis methods including hierarchical cluster analysis were employed to examine the distribution characteristics of these accidents. Accidents were found to be concentrated in July and August, and the distribution over the seven days of the week was relatively uniform; only Sunday had a higher number of accidents and deaths. In terms of 24-hour distribution, the one-hour periods with the most accidents and deaths were 8:00–9:00, 10:00–11:00, 14:00–15:00, and 18:00–19:00. Tibet, Qinghai, and Ningxia had the highest death…
  • More
  •   Views:166       Downloads:119        Download PDF
  • A New Four-Parameter Moment Exponential Model with Applications to Lifetime Data
  • Abstract In this research article, we propose and study a new model the so-called Marshal-Olkin Kumaraswamy moment exponential distribution. The new distribution contains the moment exponential distribution, exponentiated moment exponential distribution, Marshal Olkin moment exponential distribution and generalized exponentiated moment exponential distribution as special sub-models. Some significant properties are acquired such as expansion for the density function and explicit expressions for the moments, generating function, Bonferroni and Lorenz curves. The probabilistic definition of entropy as a measure of uncertainty called Shannon entropy is computed. Some of the numerical values of entropy for different parameters are given. The method of maximum likelihood…
  • More
  •   Views:113       Downloads:104        Download PDF
  • Performance Evaluation of Medical Segmentation Techniques for Cardiac MRI
  • Abstract The process of segmentation of the cardiac image aims to limit the inner and outer walls of the heart to segment all or portions of the organ’s boundaries. Due to its accurate morphological information, magnetic resonance (MR) images are typically used in cardiac segmentation as they provide the best contrast of soft tissues. The data acquired from the resulting cardiac images simplifies not only the laboratory assessment but also other conventional diagnostic techniques that provide several useful measures to evaluate and diagnose cardiovascular disease (CVD). Therefore, scientists have offered numerous segmentation schemes to remedy these issues for producing more accurate…
  • More
  •   Views:205       Downloads:170        Download PDF
  • An Adaptive SAR Despeckling Method Using Cuckoo Search Algorithm
  • Abstract Despeckling of SAR imagery is a crucial step prior to their automated interpretation as information extraction from noisy images is a challenging task. Though a huge despeckling literature exists in this regard, there is still a room for improvement in existing techniques. The contemporary despeckling techniques adversely affect image edges during the noise reduction process and are thus responsible for losing the significant image features. Therefore, to preserve important features during the speckle reduction process, a two phase hybrid despeckling filter is proposed in this study. The first phase of the hybrid filter focuses on edge preservation by employing a…
  • More
  •   Views:104       Downloads:115        Download PDF
  • Analysis of Security Testing Techniques
  • Abstract In the past decades, a significant increase has been observed in cyber-attacks on the web-based systems used for financial purposes. Such individual systems often contain security weaknesses, called vulnerabilities that can be exploited for malicious purposes. The exploitation of such vulnerabilities can result in disclosure and manipulation of sensitive data as well as have destructive effects. To protect such systems, security testing is required on a periodic basis. Various detection and assessment techniques have been suggested by developers and researchers to address these security issues. In this paper, we survey the contributions of academia in the field of security testing…
  • More
  •   Views:195       Downloads:129        Download PDF
  • Optimizing the Software Testing Problem Using Search-Based Software Engineering Techniques
  • Abstract Software testing is a fundamental step in the software development lifecycle. Its purpose is to evaluate the quality of software applications. Regression testing is an important testing methodology in software testing. The purpose of regression testing is to validate the software after each change of its code. This involves adding new test cases to the test suite and running the test suite as the software changes, making the test suite larger. The cost and time of the project are affected by the test suite size. The challenge is to run regression testing with a smaller number of test cases and…
  • More
  •   Views:308       Downloads:138        Download PDF
  • Key Frame Extraction of Surveillance Video Based on Frequency Domain Analysis
  • Abstract Video key frame extraction, reputed as an essential step in video analysis and content-based video retrieval, and meanwhile, also serves as the basis and premise of generating video synopsis. Video key frame extraction means extracting the meaningful parts of the video by analyzing their content and structure to form a concise and semantically expressive summary. Up to now, people have achieved many research results in key frame extraction. Nevertheless, because the surveillance video has no specific structure, such as news, sports games, and other videos, it is not accurate enough to directly extract the key frame with the existing effective…
  • More
  •   Views:91       Downloads:78        Download PDF
Displaying 1-10 on page 1 of 447. Per Page