n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators
In this paper, a simple fast lossless image compression method is introduced for compressing medical images, it is based on integrates multiresolution coding along with polynomial approximation of linear based to decompose image signal followed by efficient coding. The test results indicate that the suggested method can lead to promising performance due to flexibility in overcoming the limitations or restrictions of the model order length and extra overhead information required compared to traditional predictive coding techniques.
In all process industries, the process variables like flow, pressure, level, concentration
and temperature are the main parameters that need to be controlled in both set point
and load changes.
A control system of propylene glycol production in a non isothermal (CSTR) was
developed in this work where the dynamic and control system based on basic mass
and energy balance were carried out.
Inlet concentration and temperature are the two disturbances, while the inlet
volumetric flow rate and the coolant temperature are the two manipulations. The
objective is to maintain constant temperature and concentration within the CSTR.
A dynamic model for non isothermal CSTR is described by a first order plus dead
time (FO
Introduction: All-ceramic crowns are widely used in prosthodontics and cosmetic dentistry due to their good esthetic and proper physical properties. Chipping of ceramic is one of the most common post-insertion complications, that can be fixed either extraoral or intraorally. The latter is time time-effective alternative, less traumatic, and low-cost. A newer objective method of laser is a surface modification of ceramics to increase surface roughness. The aim of this study is to provide a review of Er,Cr;YSGG (2960nm) in intraoral repair and shear bond strength (SBS). Method: A thorough search considering Google Scholar and PubMed published data and ten articles found wh
... Show More
There is no doubt that the achievement of the manuscripts of There is no doubt various of situations for performing a duty , The diversity of stimuli in humans with sensory, unconscious and instinct sensitive systems. Which leads to a diversity of feelings, sensations, emotions and feelings, This therefore requires different types of function linguistic structures indication , Of that linguistic potential that God willing to be unique, In the function of discharging and venting those feelings and emotions that are raised by its various stimuli, which are only needs and psychological and biological purposes require verification and access and gain it. S
... Show MoreThis study concluded detection of Toxoplasma gondii in milk, immunologically by using Elisa and nested PCR)nPCR (based on B1 gene, also to investigate the effect of toxoplasmosis, parity, breed and flock on some milk composition in the Iraqi local and Shami goats in the middle of Iraq. A total of 80 milk samples of the lactating goats were collected. Results of this study showed the prevalence of Toxoplasmosis was 21.25% and 28.75% by Elisa and nPCR respectively without significant differences. The sensitivity of Elisa was a low (30.43%) whereas the specificity was a high (82.45%). The degree of agreement estimated by Kappa coefficient revealed a slight agreement (0.14) between two methods. The results indicated that goats infected
... Show MoreThis paper is concerned with introducing and studying the o-space by using out degree system (resp. i-space by using in degree system) which are the core concept in this paper. In addition, the m-lower approximations, the m-upper approximations and ospace and i-space. Furthermore, we introduce near supraopen (near supraclosed) d. g.'s. Finally, the supra-lower approximation, supraupper approximation, supra-accuracy are defined and some of its properties are investigated.
The problem of soil contamination is increased recently due to increasing the industrial wastes such as petroleum hydrocarbon, organic solvents, and heavy metals as well as maximizing the use of agricultural fertilizers. During this period, wide development of data collection methods, using remote sensing techniques in the field of soil and environment applications appear and state the suitable technique for remediation. This study deals with the application of remote sensing techniques in geoenvironmental engineering through a field spectral reflectance measurements at nine spots of naturally hydrocarbons contaminated soil in Al-Daura Refinery Company site which is located to the south west of Baghdad using radiometer device to get stan
... Show MoreExchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha
... Show MoreAbstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show More