This paper discusses estimating the two scale parameters of Exponential-Rayleigh distribution for singly type one censored data which is one of the most important Rights censored data, using the maximum likelihood estimation method (MLEM) which is one of the most popular and widely used classic methods, based on an iterative procedure such as the Newton-Raphson to find estimated values for these two scale parameters by using real data for COVID-19 was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. The duration of the study was in the interval 4/5/2020 until 31/8/2020 equivalent to 120 days, where the number of patients who entered the (study) hospital with sample size is (n=785). The number of patients who died during the period of study was (m=88). And the number of patients who survived during the study period was (n-m=697), then utilized one of the most important non-parametric tests which is the Chi-square test to determine if the sample (data) corresponded with the Exponential-Rayleigh distribution (ER). then, after estimating the parameters of ER distribution for singly type-I censoring data, compute the survival function, hazard function, and probability density function.
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreThe present study aimed to synthesize selenium nanoparticles (SeNPs) using aqueous extract of black currant as a reducing agent. The green synthesized black currant selenium nanoparticles (BCSeNPs) were identified by color change. The characterization of SeNPs was achieved by Ultraviolet-visible (UV–VIS) spectroscopy, scanning electron microscopy (SEM), X–ray diffraction analysis (XRD), and Fourier transform infrared spectroscopy (FTIR). These tests were used to detect: stability, morphology, size, crystalline nature, and functional groups present on the surface of BCSeNPs. The results revealed appearance of the brick-red color indicating the specific color of selenium nanoparticles, and UV-Vis spectroscopy showed band absorbanc
... Show MoreNinety eight mobile samples, (54) galaxy phone and (44) I phone, were swabbed for bacterial culture determination by culturing on MacConky agar , Blood agar , Mannitol salt agar , Muller Hinton agar .Staphylococcuswas the highest frequent isolated bacteria from Galaxy phone (33%) and I phone (37%). This study revealed that galaxy phone appears less contaminated with bacteria, the ratio of non-contaminated devices is (44%) when compared with I phone (9%). Sensitivity test showed that Ogmintin have the lowest effect on Staphylococcusisolated from both type of devices while cefitriaxone have the highest effect. DNA of isolate from galaxy 31 that exhibit highest resistance against antibiotics was extracted and 16S rRNA gene was polymerized by P
... Show MoreResearchers have increased interest in recent years in determining the optimum sample size to obtain sufficient accuracy and estimation and to obtain high-precision parameters in order to evaluate a large number of tests in the field of diagnosis at the same time. In this research, two methods were used to determine the optimum sample size to estimate the parameters of high-dimensional data. These methods are the Bennett inequality method and the regression method. The nonlinear logistic regression model is estimated by the size of each sampling method in high-dimensional data using artificial intelligence, which is the method of artificial neural network (ANN) as it gives a high-precision estimate commensurate with the dat
... Show MoreThe poetic text, being an artistic product, is achieved during the moment of inspiration. However, this inspiration does not come from a vacuum. Rather, it needs a good environment capable of pushing the poetic text to the surface after its formation in the poet's mind, with the images and ideas it contains, expressed in his own language and style. Distinguished, and we must not overlook that language is not just words and meanings, but rather those feelings and emotions that are the essence of creativity (()), including musical, sentimental and imaginative aspects with colors of suggestion and symbols (()), because the poetic language is distinguished from others in that it (Symbols for psychological states are the substance of thought)
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.