In this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3) of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the percentile estimator is the best in (E1, E2) but modification moment is the best in (E3) .
In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.
A standard theoretical neutron energy flux distribution is achieved for the triton-triton nuclear fusion reaction in the range of triton energy about ≤10 MeV. This distribution give raises an evidence to provide the global calculations including the characteristics fusion parameters governing the T-T fusion reaction.
Discriminant analysis is a technique used to distinguish and classification an individual to a group among a number of groups based on a linear combination of a set of relevant variables know discriminant function. In this research discriminant analysis used to analysis data from repeated measurements design. We will deal with the problem of discrimination and classification in the case of two groups by assuming the Compound Symmetry covariance structure under the assumption of normality for univariate repeated measures data.
... Show More
Design sampling plan was and still one of most importance subjects because it give lowest cost comparing with others, time live statistical distribution should be known to give best estimators for parameters of sampling plan and get best sampling plan.
Research dell with design sampling plan when live time distribution follow Logistic distribution with () as location and shape parameters, using these information can help us getting (number of groups, sample size) associated with reject or accept the Lot
Experimental results for simulated data shows the least number of groups and sample size needs to reject or accept the Lot with certain probability of
... Show MoreAbstract: Aluminum alloys grade 6061-T6 are characterized by their excellent properties and processing characteristics which make them ideal for varieties of industrial applications under cyclic loading, aluminum alloys show less fatigue life than steel alloys of similar strength. In the current study, a nanosecond fiber laser of maximum pulse energy up to 9.9 mJ was used to apply laser shock peening process (LSP) on aluminum thin sheets to introduce residual stresses in order to enhance fatigue life under cyclic loading Box-Behnken design (BBD) based on the design of experiments (DOE) was employed in this study for experimental design data analysis, model building and optimization The effect of working parameters spot size (ω), scannin
... Show MoreVarious methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten
... Show MoreBackground: Gugglusterone has been reported to provide protection against inflammatory and oxidative reactions of different pathological conditions. Objectives: The main object of this research work is to evaluate the renoprotective effects of guggulsterone in the prevention of cisplatin-induced nephrotoxicity in rats via assessment of renal function and histological study. Materials and methods: Rats in this study were split into four groups which comprise a control group, an induction group, a third group receiving low-dose guggulsterone, and a fourth group receiving high-dose guggulsterone. Results: a single dose of cisplatin drug has jeopardisedrenal physiology that has been demonstrated in histopathology sections and elevation
... Show More