The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.
Necessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
The study was conducted from November 2021 to May 2022 at the three study sites within the Baghdad governorate. The study aims to identify the impact of human activities on the Tigris River, so an area free of human activities was chosen and represented the first site. A total of 48 types were diagnosed, 6204 ind/m3 spread over three sites. The following environmental indicators were evaluated: Constancy Index (S), Relative abundance index (Ra), Richness Index (between 17.995 and 23.251), Shannon Weiner Index (0.48-1.25 bit/ind.), Uniformity Index (0.124 -0.323). The study showed that the highest percentage recorded was for the phylum Annileda 34%; and the stability index shows that taxes (Stylaria sp., Aoelosoma sp., Branchinra sowerby, Ch
... Show MoreThe main idea of the financial censorship is to submit the states funds to a censorship because they are the funds of the people and because this censorship is a right and role ensured by the constitution for specific devices in the state, thus the role of the financial censor should be launched to achieve this goal in all walks of the state. • The power of this censorship depends basically on the independence of the censorious bodies over a job which is submitted to this censorship and the censor should have a reverence , this censorship is practiced as a precautionary procedure before preparing the budget to avoid mistakes after and during the execution for maintaining the states funds. • The importance of the censorship comes from
... Show MoreThe present work aimed to study effect of (N749 & N3) dyes on TiO2 optical and electrical properties for optoelectronic application. The TiO2 paste prepared by using a doctor blade method. The samples were UV-VIS specterophometricall analyzes of TiO2 before and after immersed in dyes (N749 & N3). The results showed absorption spectra shift toward the visible region due to the adsorption of dye molecules on the surface of oxide nanoparticles. It is seen that the Eg determined to give a value of 3.3eV for TiO2 before immersing in dyes, and immersing in dyes (N749 & N3) are (1.4 &1.6 eV) respectively. The structural properties (XRD), (FTIR) and (SEM) for the sample prepared were investigated and (J-V) characteristics was stu
... Show MoreAfter word war ll, the United States of America pursued a policy of containment aimed at preventing the Soviet Union from penetrating into the countries of the world, especially the regions of the Middle East, Therefore, it worked to emphasize the establishment of relations that include various political, economic and even cultural aspects, and focused its policy in his aspect on Turkey due to its geopolitical position. At a time when Turkey was undergoing developments at various levels and a change in govemment policy after the Demccratic Party came to power, which focused in its foreign policy on strengthening reltions with the West in general and the United States America in particular. The US government was the supporter of Democrat
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreBac kground:: Septal deviation is one of the commonest anatomical deformities of the nasal skeleton, this deviation is usually accompanied by compensatory hypertrophy of the inferior turbinate on the concave side that will accentuate the severity of nasal obstruction.
Objectives: To evaluate the effect of septoplasty on the size of the inferior turbinate in patients with nasal septum deviation.
Methods: This is a prospective study of 25 patients attending the otolaryngological department at Al-Jirahat teaching hospital from September 2011 to November 2013, complaining mainly of nasal obstruction. Otolaryngological examination had shown nasal septum deviation. The cross sectional areas of inferior turbinates were measured with compu
Benign prostatic hyperplasia (BPH) is one of the most common disease and major cause of morbidity in elderly men which may lead to bladder outflow obstruction and lower urinary tract symptoms (LUTS). Although sex steroid hormones play fundamental roles in prostate growth, their clinical significance is not completely clear. In the present study we assessed whether serum hormones levels as markers of prostate disease. This study includes (40) patients with benign prostatic hypertrophy and (40) control group with age rang (41-79) and (42-71) years respectively. The following biochemical investigations have been studied: Testosterone, Estradiol (E2), and Prostatic Specific Antigen (PSA) levels using ELISA method which correlated with t
... Show MoreIn this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 p
... Show More