The research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such as the presence of anomalous values or extreme values or the appropriate distribution of these data is unknown. Therefore, the data need methods through which can be dealt with this problem. Two of the estimation methods have been used: the robust (estimator M) method and the nonparametric Kernel method. These estimation methods are derived to arrive at the formulas of their capabilities. A comparison of these estimations is made using the simulation method as it is implemented. Simulation experiments using different sample sizes and each experiment is repeated (1000) times to achieve the objective. The results are compared by using one of the most important statistical measures which is the mean of error squares (MSE). The best estimation method has been reached is the robust (M estimator) method. It has been shown that the estimation of the reliability function gradually decreases with time, and this is identical to the properties of this function.
The educational sector is one of the important sectors in the world, and it is considered one of the means of community development. In addition, it is one of the means of making the country’s renaissance and devel-opment because it represents the factory of thinking minds that make change. There is no doubt that this sector is the same as any other sector. The deficit in the studied scientific planning has been prolonged, which led to its deterioration, and the problems of education remain diverse and inherited from previous time periods, where the hierarchical cluster analysis was used on postgraduate students in universities in Iraq, except for Kurdistan region, and the number of universities that were included in the study was
... Show Moreم.د. فاطمة حميد ،أ.م.د وفاء صباح محمد الخفاجي, International Journal of Psychosocial Rehabilitation,, 2020 - Cited by 1
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking ty
... Show MoreThe radial wave functions of the cosh potential within the three-body model of (Core+ 2n) have been employed to investigate the ground state properties such as the proton, neutron and matter densities and the associated rms radii of neutron-rich 6He, 11Li, 14Be, and 17B exotic nuclei. The density distributions of the core and two valence (halo) neutrons are described by the radial wave functions of the cosh potential. The obtained results provide the halo structure of the above exotic nuclei. Elastic electron scattering form factors of these halo nuclei are studied by the plane-wave Born approximation.
Some methods recommended abroad to control the oriental hornet, Vespa orientalis L., attacking the honey bee, Apis mellifera L., colonies were tested, with some modifications, for the first time under the Iraqi conditions. One of these methods was carried out by covering the hive entrance with a piece of queen excluder to prevent the hornet from entering the hive. Also, the position of hive stand was reversed to deprive the hornet from using the flight board as a stage for waiting and creeping toward the defending bees. The second method was carried out by fixing a cardboard cone as a bee passage at the hive entrance to hinder the entry of the hornet into the hive. Both of these methods were found to be unsuccessful to
... Show MoreUsing the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha
... Show MoreMixture experiments are response variables based on the proportions of component for this mixture. In our research we will compare the scheffʼe model with the kronecker model for the mixture experiments, especially when the experimental area is restricted.
Because of the experience of the mixture of high correlation problem and the problem of multicollinearity between the explanatory variables, which has an effect on the calculation of the Fisher information matrix of the regression model.
to estimate the parameters of the mixture model, we used the (generalized inverse ) And the Stepwise Regression procedure
... Show MoreA study has been performed to compare the beddings in which ductile iron pipes are buried. In water transmission systems, bends are usually used in the pipes. According to the prescribed layout, at these bends, unbalanced thrust forces are generated that must be confronted to prevent the separation of the bend from the pipe. The bed condition is a critical and important factor in providing the opposite force to the thrust forces in the restraint joint system. Due to the interaction between the native soil and the bedding layers in which the pipe is buried and the different characteristics between them. Also, the interaction with the pipe material makes it difficult to calculate the real forces opposite to the thrust forces and the way they
... Show More