In this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.
in this work the polymides were prepared as rthemally stable polymers by diffrent ways
Background: The present study aimed to determine the influence of the different types of mouth wash on discoloration of different orthodontic ceramic, sapphire brackets and adhesives. Materials and methods: The sample composed of 120 ceramic brackets and 120 sapphire brackets, the brackets were divided according to bond material into three groups of 40 brackets include unbounded brackets, chemically cured (no-mix) bonded brackets and Light cured bonded brackets all these groups were further subdivided according to mouth wash type into three groups with 10 brackets each which include; Listerine, cetrimide, chlorhexidine 0.2%, and one control group which immersed in artificial saliva; then Staining measurements were performed with UV-Visibl
... Show MoreDuring the last decade, there has been a concern about the relation between aluminum residuals in treated water and Alzheimer disease, and more interest has been considered on the development of natural coagulants. The present study aimed to investigate the efficiency of alum as a primary coagulant in conjunction with mallow, Arabic gum and okra as coagulant aids for the treatment of water samples containing synthetic turbidity of kaolin. Jar test experiments were carried out for initial raw water turbidities 100, 200 and 500 (NTU). The optimum doses of alum, mallow, Arabic gum and okra were 20, 2, 1 and 1 mg/L for100 NTU turbidity level, 35, 4, 2 and 3 mg/L , for 200NTU turbidity level and 50, 8, 10 and 8 mg/L for 500 NTU turbidity leve
... Show MorePhenol oxidation by Fenton's reagent (H2O2 + Fe+2) in aqueous solution has been studied for the purpose of learning
more about the reactions involved and the extent of the oxidation process, under various operating conditions. An initial
phenol concentration of 100 mg/L was used as representative of a phenolic industrial wastewater. Working temperature
of 25C was tested, and initial pH was set at 5.6 . The H2O2 and the Fe+2 doses were varied in the range of
(H2O2/Fe+2/phenol = 3/0.25/1 to 5/0.5/1). Keeping the stirring speed of 200 rpm.
The results exhibit that the highest phenol conversion (100%) was obtained under (H2O/Fe+2/phenol ratio of 5/0.5/1)
at about 180 min. The study has indicated that Fenton's oxidation i
The MTX was converted to MTX nanoparticles by the modified method based on changing the pH gradually . For the first time MTX NPs+Meropenem complex were prepared and evaluated as a potential tool to overcome antimicrobial resistance and to improve pharmacokinetics of the drug, the results showed that the antibacterial activity of complex (MTX NPs plus MEM) has increased (from 1( µg/ml) to >0.5( µg/ml) for p1 , from 2( µg/ml) to 1( µg/ml) for p10 and from 8( µg/ml) to 4( µg/ml) for p48).
The research dealt with the subject of measuring the competitive performance of the National Insurance Company and some of its branches (Basra, Ninwa, Kirkuk and Babil), Depending on the Revenue Growth Index at the activity level, and the Revealed Comparative Advantage Index RCAIAt the branch level,To measure the competitiveness of the company And some branches, As the problem of research in the lack of adoption by some companies in the insurance service sector on scientific indicators to measure their competitive performance, The aims of the research is to measure the competitiveness of the National Insurance Company, as well as the competitiveness of its branches according to the scientific method, One of the main Conclusions of the re
... Show MoreWith the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us
... Show More