In this paper, the maximum likelihood estimates for parameter ( ) of two parameter's Weibull are studied, as well as white estimators and (Bain & Antle) estimators, also Bayes estimator for scale parameter ( ), the simulation procedures are used to find the estimators and comparing between them using MSE. Also the application is done on the data for 20 patients suffering from a headache disease.
Online service is used to be as Pay-Per-Use in Cloud computing. Service user need not be in a long time contract with cloud service providers. Service level agreements (SLAs) are understandings marked between a cloud service providers and others, for example, a service user, intermediary operator, or observing operators. Since cloud computing is an ongoing technology giving numerous services to basic business applications and adaptable systems to manage online agreements are significant. SLA maintains the quality-of-service to the cloud user. If service provider fails to maintain the required service SLA is considered to be SLA violated. The main aim is to minimize the SLA violations for maintain the QoS of their cloud users. In this res
... Show MoreThis paper studies a novel technique based on the use of two effective methods like modified Laplace- variational method (MLVIM) and a new Variational method (MVIM)to solve PDEs with variable coefficients. The current modification for the (MLVIM) is based on coupling of the Variational method (VIM) and Laplace- method (LT). In our proposal there is no need to calculate Lagrange multiplier. We applied Laplace method to the problem .Furthermore, the nonlinear terms for this problem is solved using homotopy method (HPM). Some examples are taken to compare results between two methods and to verify the reliability of our present methods.
The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show MoreIn this paper Volterra Runge-Kutta methods which include: method of order two and four will be applied to general nonlinear Volterra integral equations of the second kind. Moreover we study the convergent of the algorithms of Volterra Runge-Kutta methods. Finally, programs for each method are written in MATLAB language and a comparison between the two types has been made depending on the least square errors.
This study deals with knowing the types of research in public relations studies at the Faculty of Mass Communication for the period from 1989 to 2007 and knowing the methods that researchers used in their studies, as well as knowing the methods and tools of scientific research that were used, and whether one method or tool is used more than others, and knowing Samples used in the analysis. As well as the contents and types of this research The institutions that were subjected to the study, and the preparation of the respondents This research aims to answer the following questions:. A- What are the types of research and methods that were used in university theses that dealt with the topic? Public Relations at the Faculty of Media from 1989
... Show MoreBacteriocins were partially purified by ammonium sulphate 50% concentraction, bacteriocin activity of Pediococcus acidilactici-FMAC278 was 25600 U/ml with 5.8 folds and 7.6% yeild, the activity decrease to 12800 U/ml after dialysis with 6.3 folds and 3% yield, On the other hand the bacteriocin activity of Weissella paramesenteroides-DFR6 was 12800 U/ml with 2.7 folds and 8.8% yeild, after dialysis the activity became 6400 U/ml with 5.1 fold and 3.4% yield, Chicken Sausage were made by adding 0.25, 0.5 and 1% particaly purified bacteriocin to study its effect on microorganisms and increasing shelf life of Sausage. It is found that bacterial numbers were decreased after 3 days of storage at refrigerator at 0.5% conc. While the molds decrea
... Show MoreBackground: With the increasing demands for adult orthodontics, a growing need arises to bond attachments to porcelain surfaces. Optimal adhesion to porcelain surface should allow orthodontic treatment without bond failure but not jeopardize porcelain integrity after debonding.The present study was carried out to compare the shear bond strength of metal bracket bonded to porcelain surface prepared by two mechanical treatments and by using different etching systems (Hydrofluoric acid 9% and acidulated phosphate fluoride 1.23%). Materials and Methods: The samples were comprised of 60 models (28mm *15mm*28mm) of metal fused to porcelain (feldspathic porcelain). They were divided as the following: group I (control): the porcelain surface left u
... Show MoreThe importance of this research has been to rationalize the cost of producing maize seeds through the followers of modern techniques and methods in agricultural activities such as genetic engineering for the purpose of increasing production efficiency of maize seeds as well as the importance of calculating seed cost rationalization through the ABC system and thus rationalizing government spending. The research is based on a single hypothesis that the use of genetic engineering on corn seeds works to:increase production efficiency of seeds and savings in agricultural inputs, calculation of rationalization through the cost system on the basis of activity ABC The research reached a number of conclus
... Show More