In this paper, point estimation for parameter ? of Maxwell-Boltzmann distribution has been investigated by using simulation technique, to estimate the parameter by two sections methods; the first section includes Non-Bayesian estimation methods, such as (Maximum Likelihood estimator method, and Moment estimator method), while the second section includes standard Bayesian estimation method, using two different priors (Inverse Chi-Square and Jeffrey) such as (standard Bayes estimator, and Bayes estimator based on Jeffrey's prior). Comparisons among these methods were made by employing mean square error measure. Simulation technique for different sample sizes has been used to compare between these methods.
Background. Nocturnal enuresis (NE), defined as intermittent involuntary urine leakage during sleep, affects approximately 16% of children at age 5 and 10% at age 7, with prevalence declining with age. Aim. To evaluate the urodynamic features of patients with non-monosymptomatic nocturnal enuresis (NMNE). Methods. This cross-sectional study was conducted from June 2015 to September 2020 in a surgical subspecialty hospital within a major medical city complex, including 237 patients. Eligible patients were older than seven years, diagnosed with NMNE, and had refractory enuresis, defined as persistent symptoms despite at least six months of continuous medical treatment. All patients underwent a detailed history, bladder diary review, c
... Show MoreThe non-isothermal crystallization kinetics and crystalline properties of nanocomposites poly butyleneterephthalate, [PBT] /multiwalled-carbon nanotubes (MWCNTs) were tested by differential scanning calorimetry (DSC). PBT/(MWCNTs) nanocomposite was prepared by ultrasonicated of MWCNTs (0.5, 1, 2, 4 wt %) in dichloromethane (DCM) and after that the powdered PBT polymer was added to the MWCNTs solution. The non-isothermal crystallization results show that increasing the MWCNTs contents, decreased the melting temperature (Tm) of PBT/(MWCNTs) nanocomposite as compared with pure PBT, while resulting in improving the degree of crystallinity. These results indicated that a little amount of MWCNTs can be evident strong nucleating agent in PBT na
... Show MoreThe main aim of this study is to assess the performance and residual strength of post-fire non-prismatic reinforced concrete beams (NPRC) with and without openings. To do this, nine beams were cast and divided into three major groupings. These groups were classified based on the degrees of heating exposure temperature chosen (ambient, 400, and 700°C), with each group containing three non-prismatic beams (solid, 8 trapezoidal openings, and 8 circular openings). Experimentally, given the same beam geometry, increasing burning temperature caused degradation in NPRC beams, which was reflected in increased mid-span deflection throughout the fire exposure period and also residual deflectio
Estimation of mechanical and physical rock properties is an essential issue in applications related to reservoir geomechanics. Carbonate rocks have complex depositional environments and digenetic processes which alter the rock mechanical properties to varying degrees even at a small distance. This study has been conducted on seventeen core plug samples that have been taken from different formations of carbonate reservoirs in the Fauqi oil field (Jeribe, Khasib, and Mishrif formations). While the rock mechanical and petrophysical properties have been measured in the laboratory including the unconfined compressive strength, Young's modulus, bulk density, porosity, compressional and shear -waves, well logs have been used to do a compar
... Show MoreThis paper discussed the solution of an equivalent circuit of solar cell, where a single diode model is presented. The nonlinear equation of this model has suggested and analyzed an iterative algorithm, which work well for this equation with a suitable initial value for the iterative. The convergence of the proposed method is discussed. It is established that the algorithm has convergence of order six. The proposed algorithm is achieved with a various values of load resistance. Equation by means of equivalent circuit of a solar cell so all the determinations is achieved using Matlab in ambient temperature. The obtained results of this new method are given and the absolute errors is demonstrated.
The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
Foreign trade is very important in global economies because of its impact on the sustainability of economic growth by stimulating economic activity, creating jobs and expanding production . On the other side , this policy is a major obstacle to many developing countries and the reason is due to the nature of the economies of those countries because they rely mostly on one or a few economic resources, which makes them rely mostly on exports to that resource while they import most of the needs of their local market Which makes them in a spiral of underdevelopment , dependence and economic exposure, which requires them to break that cycle and the launch of economic development Perhaps one of the most important means to a
... Show MoreMany of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence