Methods of estimating statistical distribution have attracted many researchers when it comes to fitting a specific distribution to data. However, when the data belong to more than one component, a popular distribution cannot be fitted to such data. To tackle this issue, mixture models are fitted by choosing the correct number of components that represent the data. This can be obvious in lifetime processes that are involved in a wide range of engineering applications as well as biological systems. In this paper, we introduce an application of estimating a finite mixture of Inverse Rayleigh distribution by the use of the Bayesian framework when considering the model as Markov chain Monte Carlo (MCMC). We employed the Gibbs sampler and Metropolis – Hastings algorithms. The proposed techniques are applied to simulated data following several scenarios. The accuracy of estimation has been examined by the average mean square error (AMSE) and the average classification success rate (ACSR). The results showed that the method was well performed in all simulation scenarios with respect to different sample sizes.
Background: Eucalyptus extracts and derivatives are natural substances with potent antimicrobial properties. This study investigated the in- vitro effects of non-nutritive sweeteners on the antifungal activity of alcoholic and aqueous Eucalyptus extracts against Candida albicans, a common oral pathogen. Materials and Method: Ten isolates of Candida albicans were isolated from dental students’ salivary samples. The alcoholic and aqueous extracts were prepared from fresh Eucalyptus leaves using maceration. The sensitivity of Candida albicans isolates to various concentrations of Eucalyptus extracts ranging from 50 to 250 (mg/mL) was evaluated via agar well diffusion method, while the agar streaking method was used to assess the minimum
... Show MoreCadmium oxide (CdO) thin films were deposited using the sequencing ion layer adsorption and reaction (SILAR) method. In this study, the effect of the pH value of an aqueous solution of cadmium acetate at a concentration of 0.2 mol of the cadmium oxide film was determined. The solution source for the cadmium oxide film was cadmium ions and an aqueous ammonia solution. The CdO films were deposited on glass substrates at a temperature of 90 ℃. The cadmium oxide film thickness was determined by the weight difference method at pH values (7.2, 8.2). X-ray diffraction (XRD) and scanning electron microscopy (SEM) showed that the size of the crystals increased with the increase in the solution (pH). While the UV-visible spectra of the fil
... Show MoreBackground: Complete seal of the root canal system following its chemo-mechanical debridement plays a pivotal role for achieving successful endodontic treatment. This can be established by reducing the gaps between the core filling material and root canal wall. Aim: To assess and compare the dislocation resistance of root canals obturated with GuttaFusion® and TotalFill BC sealer versus single cone obturation technique and TotalFill BC sealer after instrumentation of the canals with WaveOne, ProTaper Next and ProTaper Universal system. Material and Method: Sixty extracted human permanent mandibular premolars were conducted in the current study. The teeth were decorated and left the root with 15mm length; the roots were divided randoml
... Show MoreThe research seeks to identify the effectiveness of a selective program in modifying irrational thinking that causes anger among an important class of societies in general. namely teachers. Specifically female teachers because of the pressures they suffer because of the nature of this profession. It may develop into anger outburst, which may cause irrational thinking arose as a result of the different situations they are going through. The sample of the program consisted of (12) teachers in Egypt, from different educational sectors. The researcher intended to clarify the emotion of anger and the irrational thoughts associated with it and the contribution of the selective counseling program in modifying those irrational thinking. This was
... Show MoreOrthogonal Frequency Division Multiplexing (OFDM) is one of recent years multicarrier modulation used in order to combat the Inter Symbol Interference (ISI) introduced by frequency selective mobile radio channel. The circular extension of the data symbol, commonly referred to as cyclic prefix is one of the key elements in an OFDM transmission scheme. This paper study The influence of the cyclic prefix duration on the BER performance of an OFDM-VCPL (Orthogonal frequency division multiplexing - Variable Cyclic Prefix Length) system and the conventional OFDM system with frame 64-QAM modulation is evaluated by means of computer simulation in a multipath fading channel. The adaptation of CP is done with respect to the delay spread estimation
... Show MoreThis paper describes a newly modified wind turbine ventilator that can achieve highly efficient ventilation. The new modification on the conventional wind turbine ventilator system may be achieved by adding a Savonius wind turbine above the conventional turbine to make it work more efficiently and help spinning faster. Three models of the Savonius wind turbine with 2, 3, and 4 blades' semicircular arcs are proposed to be placed above the conventional turbine of wind ventilator to build a hybrid ventilation turbine. A prototype of room model has been constructed and the hybrid turbine is placed on the head of the room roof. Performance's tests for the hybrid turbine with a different number of blades and different values o
... Show MoreE-Learning packages are content and instructional methods delivered on a computer
(whether on the Internet, or an intranet), and designed to build knowledge and skills related to
individual or organizational goals. This definition addresses: The what: Training delivered
in digital form. The how: By content and instructional methods, to help learn the content.
The why: Improve organizational performance by building job-relevant knowledge and
skills in workers.
This paper has been designed and implemented a learning package for Prolog Programming
Language. This is done by using Visual Basic.Net programming language 2010 in
conjunction with the Microsoft Office Access 2007. Also this package introduces several
fac
Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the need
... Show MoreMercifulness is a trait of civilization, humanity, and a moral value in society, because it has an impact on social life and its role in spreading interdependence, joint liability, and solidarity among people. Mercifulness means spreading mercy, synergy, sympathy, and cooperation. Generally, a society that enjoys strong ties tends to have a kind of stability and development, as well as, is able to face the economic, political, and security crises. Conversely, a weak society leads to weak social cohesion and weak community infrastructure that is more vulnerable to social, economic, and political instability. Thus, this is the aim of the research that has used a social survey method applied to a sample of respondents who have reached (300)
... Show MoreIn this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c
... Show More