Search
Now showing items 61-70 of 71
Confidence intervals for the quantiles of the Weibull distribution based on record values
(
Nova Science Publishers Inc
, 2008 , Article)
We consider likelihood-based and bootstrap confidence intervals for the quantiles based on record values from the Weibull distribution. We developed also intervals for the difference of quantiles based on two independent ...
The determinants of capital structure: The case of long-term debt constraint for Jordanian firms
(
Virtus Interpress
, 2008 , Article)
This paper contributes to the capital structure literature by investigating the determinants of capital structure of Jordanian companies with the constraint of inadequate long-term debt as their source of financing and ...
Poisonous plants contaminating edible ones and toxic substances in plant foods IV. Phytochemistry and toxicity of lolium temulentum
(
Taylor & Francis
, 2008 , Article)
Different procedures were carried out for the preparation and separation of the total alkaloids of Lolium temulentum. Loline has been identified as the major pyrrolizidine alkaloid of the seeds. The toxicity of the alcoholic ...
Novel thorium membrane sensors with anionic response based on trioctylphosphine oxide and toluate ionophores
(
Wiley-VCH Verlag
, 2008 , Article)
Two novel potentiometric polymeric membrane sensors for rapid and accurate determination of thorium are described. These are based on the use of trioctylphosphine oxide (TOPO) and thorium toluate (Th-TA) as ionophores ...
Digital government service machine DGSM
(
IEEE
, 2008 , Conference Paper)
The rapid improvement in latest technologies motivates individuals to progress in their societies. Fast and worthy can be significant titles for the demands of this modern life. And because of technology improvements, there ...
Efficient forward error correction for reliable transmission in packet networks
(
dblp computer science bibliography
, 2008 , Conference Paper)
This paper proposes an approach that utilizes a new forward error correction mechanism for reconstructing lost or corrupted packets sent over a Network. Instead of retransmissions of lost or corrupted packets, the new ...
Impact of MD5 authentication on routing traffic for the case of: EIGRP, RIPv2 and OSPF
(
Science Publications
, 2008 , Article)
Problem Statement: With the free flow of routing data and the high availability of computer resources, possible threats to the networks can result in loss of privacy and in malicious use of information or resources that ...
Performance evaluation of secured versus non-secured EIGRP routing protocol
(
dblp computer science bibliography
, 2008 , Conference Paper)
Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermediate node is considered. Due to the major ...
Text summarization based on conceptual data classification
(
IGI Global
, 2008 , Book chapter)
In this paper, we present an original approach for text summarization using conceptual data classification. We show how a given text can be summarized without losing meaningful knowledge and without using any semantic or ...
Economical study by determining the optimum thickness of insulation of some heaters utilized in Qatar refinery
(
International Information and Engineering Technology Association
, 2008 , Article)
Some furnaces and heaters utilized in the industry in Qatar (such as Qatar Refinery) are analyzed economically by the determination of the optimum thickness of insulation for each of these equipments. Different common ...