In this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process, where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliability was estimated by an inverse Gaussian distribution according to the characteristics of the Wiener process. It was also applied based on real data taken from an experiment intended to determine the degradation in the light intensity of lamps under specific experimental conditions
Abortion is categorized as the termination of conception caused by the failure or removal of the embryo from the uterus before the conclusion of pregnancy. Microorganisms and genetic factors are two of the many factors associated with abortion. Cytomegalovirus is a widespread congenital virus infection pathogen that affects a wide variety of people. The prothrombin gene is one of the essential causes that trigger blood clotting and the function of abortion women, therefore the aim of the study is to detect and associate Cytomegalovirus and prothrombin gene mutation (Gene ID: 14061 in NCBI) with abortion through genetic and immunological methods. Five ml of whole blood was collected from an intravenous puncture and divided into two tubes,
... Show MoreAbstract
The Issue of trade policy is one of the most important topics that researchers have been interested in because of its important role in the economy over the ages. This importance has increased due to the increasing of commercial operations at different levels in both developing and developed countries Foreign trade is one of the means of achieving economic development through the economic surpluses resulting from exports and imports, as it is an important pillar of the economy in general and the Iraqi economy in particular, in light of the transformation process that took place for the Iraqi economy in various fields due to the implement
... Show MoreThe aim of the research is to estimate the hidden population. Here، the number of drug users in Baghdad was calculated for the male age group (15-60) years old ، based on the Bayesian models. These models are used to treat some of the bias in the Killworth method Accredited in many countries of the world.
Four models were used: random degree، Barrier effects، Transmission bias، the first model being random، an extension of the Killworth model، adding random effects such as variance and uncertainty Through the size of the personal network، and when expanded by adding the fact that the respondents have different tendencies، the mixture of non-random variables with random to produce
... Show MoreThere is a growing need for up-to-date data for rapid decision making in the modern digital age. Recently, the need for high-resolution topographic maps is highly demanding by most mapping clients. With the maturing automatic structure from mobile and multi-view stereoscopy software, small organizations and individuals now have the ability to make their own surveys based on mobile mapping devices. This study looks at how feasible using low-cost Unmanned Aerial Vehicle (UAV) as a mobile mapping device for photogrammetric topographical surveys. It is showing the impact of different UAV flight settings and parameters on the accuracy of mapping products. An automatic scenario for photogra
Polynomial IIR digital filters play a crucial role in the process of image data compression. The main purpose of designing polynomial IIR digital filters of the integer parameters space and introduce efficient filters to compress image data using a singular value decomposition algorithm. The proposed work is designed to break down the complex topic into bite-sized pieces of image data compression through the lens of compression image data using Infinite Impulse Response Filters. The frequency response of the filters is measured using a real signal with an automated panoramic measuring system developed in the virtual instrument environment. The analysis of the output signal showed that there are no limit cycles with a maximum radius
... Show MoreIn this paper new methods were presented based on technique of differences which is the difference- based modified jackknifed generalized ridge regression estimator(DMJGR) and difference-based generalized jackknifed ridge regression estimator(DGJR), in estimating the parameters of linear part of the partially linear model. As for the nonlinear part represented by the nonparametric function, it was estimated using Nadaraya Watson smoother. The partially linear model was compared using these proposed methods with other estimators based on differencing technique through the MSE comparison criterion in simulation study.
The research aims to identify the importance of using the style of the cost on the basis of activity -oriented in time TDABC and its role in determining the cost of products more equitably and thus its impact on the policy of allocation of resources through the reverse of the changes that occur on an ongoing basis in the specification of the products and thus the change in the nature and type of operations . The research was conducted at the General Company for Textile Industries Wasit / knitting socks factory was based on research into the hypothesis main of that ( possible to calculate the cost of activities that cause the production through the time it takes to run these activities can then be re- distributed product cost
... Show MoreIntrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show More
