The paper shows how to estimate the three parameters of the generalized exponential Rayleigh distribution by utilizing the three estimation methods, namely, the moment employing estimation method (MEM), ordinary least squares estimation method (OLSEM), and maximum entropy estimation method (MEEM). The simulation technique is used for all these estimation methods to find the parameters for the generalized exponential Rayleigh distribution. In order to find the best method, we use the mean squares error criterion. Finally, in order to extract the experimental results, one of object oriented programming languages visual basic. net was used
In this research, the results of x-ray diffraction method were used to determine the uniform stress deformation and microstructure parameters of CuO nanoparticles to determine the lattice strain obtained and crystallite size and then to compare the results obtained by two model Halder Wagner and Size Strain Plot with the results of these methods of the same powder using equations during which the calculation of the size of the crystallite size and lattice strain, It was found that the results obtained the values of the crystallite size (19.81nm) and the lattice strain (0.004065) of the Halder-wagner model respectively and for the ssp method were the results of the crystallite size (17.20nm) and lattice strain (0.000305) respectively. The sa
... Show MoreImam Ibn Abi Shaybah counted in his book classified twenty-five and a hundred recent and impact claimed that Abu Hanifa has violated the provisions required by apparent, and these conversations and effects including with regard to worship and transactions, including with regard to personal status, including with regard to borders and felonies, and collected by Sheikh Muhammad Zahid Al-Kothari in his book funny jokes in talking about the responses of Ibn Abu Shaybah on Abu Hanifa, and these issues we will study in our research.
Abstract:
The internal audit is considered the safety valve for senior management in all institutions. It aims to protect property, and raise the efficiency and effectiveness of the administrative performance, by following up on compliance with laws and instructions and the application of regulations in a way that increases the administrative performance of the department. The internal audit is possible to determine Weaknesses or imbalances in the administrative performance. To achieve this goal, an analytical descriptive methodology was adopted. The Baghdad Health Department / Al-Rosana was considered as society for this s
... Show MoreThe study showed a significant rise in the proportion of the labor force in agriculture
activity among the detailed economic activities in 1997 with a rate (%28.9), and then
decreased to (%18.8) in 2011, and this belong to the deterioration of agriculture and the
transition to the other economic activities.
2- The highest percentage of male's participation in year 1997 obtained by the activity (A),
which is represented by agriculture , where was (%30.0) while the highest percentage of
female's participation has been brought by the activity (M) which is represented education
with a rate (% 47.9). while in 2011 that the highest proportion of males' concentration
obtained by the activity (L) with a rate (%23.1) while
A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.
This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.
This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance
The theater has live foundations that interact with all symbols and signs. It has never been far from these innovations and developments in the manner of dealing with those symbols and how and the extent of their effects on society through the world of technology because the theatrical performance contributes to its structure, a technique that is employed by designers in various technologies such as ( Music, lighting and sound effects engineer, as well as fashion designer, architecture, and modeling designer). The theater today also relied on various interactive techniques represented in the use of body language and a sign in order to communicate the meaning by forming movements, singing and dancing in order for the recipient to interact
... Show More