This work, deals with Kumaraswamy distribution. Kumaraswamy (1976, 1978) showed well known probability distribution functions such as the normal, beta and log-normal but in (1980) Kumaraswamy developed a more general probability density function for double bounded random processes, which is known as Kumaraswamy’s distribution. Classical maximum likelihood and Bayes methods estimator are used to estimate the unknown shape parameter (b). Reliability function are obtained using symmetric loss functions by using three types of informative priors two single priors and one double prior. In addition, a comparison is made for the performance of these estimators with respect to the numerical solution which are found using expansion method. The results showed that the reliability estimator under Rn and R3 is the best.
The purpose of this interview study was to explore teachers’ perceptions of Response to Intervention (RtI) implementation in their school. Particularly, the study explored teachers’ knowledge of RtI, teachers’ perceptions of RtI their intervention/instruction in school, and teachers’ suggestions of RtI implementation in their school. The study design was a qualitative interview in nature and data were collected from face-to-face interviews with four teachers in one school. The findings revealed that RtI means to identify students’ problems; the positive teachers’ perceptions of their implementation included: (a) students who demonstrate progress through RtI are those who receive private education services, (b) progress monito
... Show MoreA paraffin wax and copper foam matrix were used as a thermal energy storage material in the double passes air solar chimney (SC) collector to get ventilation effect through daytime and after sunset. Air SC collector was installed in the south wall of an insulated test room and tested with different working angles (30o, 45o and 60o). Different SC types were used; single pass, double passes flat plate collector and double pass thermal energy storage box collector (TESB). A computational model based on the finite volume method for transient tw dimensional domains was carried out to describe the heat transfer and storage in the thermal energy storage material of collector. Also, equivalent specific heat metho
... Show MoreThis research reviews the aesthetic variables that were founded according to (theatrical rehearsal) as one of the most important pillars on which the theatrical process is based, because of its necessity in developing theatrical art on several levels that helped the theatrical director in organizing his work, and this became clear through the research chapters represented in the first chapter (methodological framework) and the second chapter, which consisted of the first topic (the duality of watching / rehearsal) and the second topic (the applications of theatrical rehearsal in theatrical experiences), all the way to the third chapter (research procedures), which included the analysis of theatrical rehearsals (sharing on life), and the
... Show MoreThe effect of short range correlations on the inelastic longitudinal Coulomb form
factors for the lowest four excited 2+ states in 18O is analyzed. This effect (which
depends on the correlation parameter β) is inserted into the ground state charge
density distribution through the Jastrow type correlation function. The single particle
harmonic oscillator wave function is used with an oscillator size parameter b. The
parameters β and b are, considered as free parameters, adjusted for each excited state
separately so as to reproduce the experimental root mean square charge radius of
18O. The model space of 18O does not contribute to the transition charge density. As
a result, the inelastic Coulomb form factor of 18
This study aims to know the role of strategic leadership to achieving competitiveness in industrial establishments by identifying the respondents’ perceptions about the level of availability of dimensions of leadership strategies (creativity and innovation, risk tolerance, available opportunities) in Bashir Al-Siksek & Partners Company for the manufacture of sanitary and plastic ware in Gaza strip
To achieve this, a questionnaire was developed and distributed to a sample of managers, auditors, accountants, and administrative employees in the study sample company. The questionnaire tool was distributed to 60 employees and employees, of which (52) were retrieved, or 86.6%, and (8) were excluded for la
... Show MoreThe researcher studies and explains the content of some pictures that are published in al-Mada newspaper. The research is important as it deals with a topic that has a relation with visual culture and its role to transfer the press letter to the audience. The researcher finds that cartoonist exposed the security services through important people who have a major role in state policy and reveals the level of corruption and the weak treatments for this phenomenon and its reflection on the whole society and individuals. In addition to that, cartoonists try to encourage the public for going on the peaceful demonstrations since it is a good tool to make pressure on the government to punish the corrupts.
With the recent developments of technology and the advances in artificial intelligent and machine learning techniques, it becomes possible for the robot to acquire and show the emotions as a part of Human-Robot Interaction (HRI). An emotional robot can recognize the emotional states of humans so that it will be able to interact more naturally with its human counterpart in different environments. In this article, a survey on emotion recognition for HRI systems has been presented. The survey aims to achieve two objectives. Firstly, it aims to discuss the main challenges that face researchers when building emotional HRI systems. Secondly, it seeks to identify sensing channels that can be used to detect emotions and provides a literature review
... Show MoreThe aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
The evaluation of subsurface formations as applied to oil well drilling started around 50 years ago. Generally, the curent review articule includes all methods for coring, logging, testing, and sampling. Also the methods for deciphering logs and laboratory tests that are relevant to assessing formations beneath the surface, including a look at the fluids they contain are discussed. Casing is occasionally set in order to more precisely evaluate the formations; as a result, this procedure is also taken into account while evaluating the formations. The petrophysics of reservoir rocks is the branch of science interested in studying chemical and physical properties of permeable media and the components of reservoir rocks which are associated
... Show More