Preferred Language
Articles
/
bsj-3011
Comparing Weibull Stress – Strength Reliability Bayesian Estimators for Singly Type II Censored Data under Different loss Functions
...Show More Authors

     The stress(Y) – strength(X) model reliability Bayesian estimation which defines life of a component with strength X and stress Y (the component fails if and only if at any time the applied stress is greater than its strength) has been studied, then the reliability; R=P(Y<X), can be considered as a measure of the component performance. In this paper, a Bayesian analysis has been considered for R when the two variables X and Y are independent Weibull random variables with common parameter α in order to study the effect of each of the two different scale parameters β and λ; respectively, using three different [weighted, quadratic and entropy] loss functions under two different prior functions [Gamma and extension of Jeffery] and also an empirical Bayes estimator Using Gamma Prior, for singly type II censored sample. An empirical study has been used to make a comparison between the three estimators of the reliability for stress – strength Weibull model, by mean squared error MSE criteria, taking different sample sizes (small, moderate and large) for the two random variables in eight experiments of different values of their parameters. It has been found that the weighted loss function was the best for small sample size, and the entropy and Quadratic were the best for moderate and large sample sizes under the two prior distributions and for empirical Bayes estimation.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (9)
Scopus
Publication Date
Sun May 12 2019
Journal Name
Progress In Electromagnetics Research Letters
SOLAR MEASUREMENTS FOR 21 CM WAVELENGTH USING 3 M RADIO TELESCOPE
...Show More Authors

Solar hydrogen line emission has been observed at the frequency of 1.42 GHz (21 cm wavelength) with 3m radio telescope installed inside the University of Baghdad campus. Several measurements related to the sun have been conducted and computed from the radio telescope spectrometer. These measurements cover the solar brightness temperature, antenna temperature, solar radio flux, and the antenna gain of the radio telescope. The results demonstrate that the maximum antenna temperature, solar brightness temperature, and solar flux density are found to be 970 K, 49600K, and 70 SFU respectively. These results show perfect correlation with recent published studies.

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Enhancement of vanadium oxide doped Eu+3 for gas sensor application
...Show More Authors

Thin films of vanadium oxide nanoparticles doped with different concentrations of europium oxide (2, 4, 6, and 8) wt % are deposited on glass and Si substrates with orientation (111) utilizing by pulsed laser deposition technique using Nd:YAG laser that has a wavelength of 1064 nm, average frequency of 6 Hz and pulse duration of 10 ns. The films were annealed in air at 300 °C for two hours, then the structural, morphological and optical properties are characterized using x-ray diffraction (XRD), Field emission scanning electron microscopy (FESEM) and UV-Vis spectroscopy respectively. The X-ray diffraction results of V2O5:Eu2O3 exhibit that the film has apolycrystalline monoclinic V2O5 and triclinic V4O7 phases. The FESEM image shows a h

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Wasit Journal Of Computer And Mathematics Science
An Improved Method for Hiding Text in Image Using Header Image
...Show More Authors

The necessities of steganography methods for hiding secret message into images have been ascend. Thereby, this study is to generate a practical steganography procedure to hide text into image. This operation allows the user to provide the system with both text and cover image, and to find a resulting image that comprises the hidden text inside. The suggested technique is to hide a text inside the header formats of a digital image. Least Significant Bit (LSB) method to hide the message or text, in order to keep the features and characteristics of the original image are used. A new method is applied via using the whole image (header formats) to hide the image. From the experimental results, suggested technique that gives a higher embe

... Show More
View Publication
Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Journal Of Educational And Psychological Researches
Cognitive Distortion And Its Relationship of Parenting Reinforcement For Kindergarten Children
...Show More Authors

This research aims to identify the cognitive distortion of kindergarten children and its relationship to their parenting reinforcement. The researcher used the descriptive approach, being the closest to reaching the study objectives, To measure the relationship between the research variables, the researcher prepared two questionnaire tools for this purpose, the first for measuring "cognitive distortion", And the second is to measure "parental reinforcement", and each tool consisted of (20) items.                         

After ensuring the validity and reliability of the two research tools and their suitabi

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
1st Samarra International Conference For Pure And Applied Sciences (sicps2021): Sicps2021
Consequences for the groups 𝒮𝓛(2,𝒰), 𝒰 = 23 and 29
...Show More Authors

View Publication
Scopus (13)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jun 27 2018
Journal Name
Wireless Communications And Mobile Computing
Developing a Video Buffer Framework for Video Streaming in Cellular Networks
...Show More Authors

This work proposes a new video buffer framework (VBF) to acquire a favorable quality of experience (QoE) for video streaming in cellular networks. The proposed framework consists of three main parts: client selection algorithm, categorization method, and distribution mechanism. The client selection algorithm was named independent client selection algorithm (ICSA), which is proposed to select the best clients who have less interfering effects on video quality and recognize the clients’ urgency based on buffer occupancy level. In the categorization method, each frame in the video buffer is given a specific number for better estimation of the playout outage probability, so it can efficiently handle so many frames from different video

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Al-kindy College Medical Journal
Postprandial Hyperglycemia as a Significant Risk Factor for Coronary Heart Disease
...Show More Authors

Background: The highest concentrations of
blood glucose during the day are usually found
postprandialy. Postprandial hyperglycemia (PPH)
is likely to promote or aggravate fasting
hyperglycemia. Evidence in recent years suggests
that PPH may play an important role in functional
& structural disturbances in different body organs
particularly the cardiovascular system.
Objective: To evaluate the effect of (PPH) as a
risk factor for coronary Heart disease in Type 2
diabetic patients.
Methods: Sixty-three type2 diabetic patients
were included in this study. All have controlled
fasting blood glucose, with HbA1c correlation.
They were all followed for five months period
(from May to October 2008)

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 04 2021
Journal Name
Iium Engineering Journal
RELIABLE ITERATIVE METHODS FOR SOLVING 1D, 2D AND 3D FISHER’S EQUATION
...Show More Authors

In the present paper, three reliable iterative methods are given and implemented to solve the 1D, 2D and 3D Fisher’s equation. Daftardar-Jafari method (DJM), Temimi-Ansari method (TAM) and Banach contraction method (BCM) are applied to get the exact and numerical solutions for Fisher's equations. The reliable iterative methods are characterized by many advantages, such as being free of derivatives, overcoming the difficulty arising when calculating the Adomian polynomial boundaries to deal with nonlinear terms in the Adomian decomposition method (ADM), does not request to calculate Lagrange multiplier as in the Variational iteration method (VIM) and there is no need to create a homotopy like in the Homotopy perturbation method (H

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Aug 01 2007
Journal Name
Al-nahrain Journal For Engineering Sciences
Monitoring and Control on Impressed Current Cathodic Protection for Oil Pipelines
...Show More Authors

This research is devoted to design and implement a Supervisory Control and Data Acquisition system (SCADA) for monitoring and controlling the corrosion of a carbon steel pipe buried in soil. A smart technique equipped with a microcontroller, a collection of sensors and a communication system was applied to monitor and control the operation of an ICCP process for a carbon steel pipe. The integration of the built hardware, LabVIEW graphical programming and PC interface produces an effective SCADA system for two types of control namely: a Proportional Integral Derivative (PID) that supports a closed loop, and a traditional open loop control. Through this work, under environmental temperature of 30°C, an evaluation and comparison were done for

... Show More
View Publication Preview PDF