In this paper, the maximum likelihood estimates for parameter ( ) of two parameter's Weibull are studied, as well as white estimators and (Bain & Antle) estimators, also Bayes estimator for scale parameter ( ), the simulation procedures are used to find the estimators and comparing between them using MSE. Also the application is done on the data for 20 patients suffering from a headache disease.
There are different types of young isolated NSs: radio pulsars, compact central X-ray sources in supernova, magentas: anomalous x-ray pulsars (AXPs) and soft gamma-ray repeaters (SGRs).This paper shows that the value of magnetic field (B), characteristic age ( ), spin down luminosity ( equilibrium period ( and Flux density ( ) was determined depending on some properties of pulsar star, such as the value of period of the pulsar (P) and the time derivative period ( for sample stars which were adopted. The model that which adopted is Hallo Cone Model. The results showed that the Normal pulsar stars have a big magnetic field, equilibrium period and Spin down than the Millisecond pulsar stars.But Millisecond pulsar stars have large values of
... Show MoreThe current research aims to adopt production quality decisions as the most important decisions , because they are accompanied by customer satisfaction through monitoring the quality of drinking water in iraq which reach through the pipeline network associated with water treatment projects of Tigris and Euphrates rivers. One of the indicators of quality control was the drawing of the C-chart by specifying the central line and the upper and lower limit of the control and the diagnosis of whether the production system as a whole within the scope of quality control or not and determine the strength and significance of the correlation between the quantities of water And actual needs for customers , the research has reached a number o
... Show MoreSurvival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete
... Show MoreBackground: Extreme obesity is recognized to be a risk factor for coronary heart disease. It is unclear whether overweight and normal weight also poses a risk.
Objective: The study aims to determine the effect of the body mass index on coronary arteries and left ventricular functions in patients with post myocardial infarction (MI) angina
Method: The study included 50 patients with the diagnosis of post MI angina consecutively admitted to the medical ward of Iraqi Center for Heart Disease. All patients underwent
coronary artery catheterization and Echocardiography for assessment of coronary artery and left ventricular functions
Results: The results of the study showed that there is a significant diff
Background: Extreme obesity is recognized to be a risk factor for coronary heart disease. It is unclear whether overweight and normal weight also poses a risk.
Objective: The study aims to determine the effect of the body mass index on coronary arteries and left ventricular functions in patients with post myocardial infarction (MI) angina
Method: The study included 50 patients with the diagnosis of post MI angina consecutively admitted to the medical ward of Iraqi Center for Heart Disease. All patients underwent
coronary artery catheterization and Echocardiography for assessment of coronary artery and left ventricular functions
Results: The results of the study showed that there is a significant difference
The growth of social media is now utilized all over the world. In the past several years social media is used to communicate between person for information sharing and entertainment but now social media is also used for the hiring. This work collects data through questionnaire and online dataset on the recruitment process for three social media i.e. Facebook, Twitter, and LinkedIn. Pythagorean Fuzzy Relation (PFR) is an expansion of both Fuzzy Relationship and Fuzzy Intuitionist Relationship. The Pythagorean fuzzy set is a modern conceptual structure with greater capacity to deal with imprecision rooted in decision making. So we used this technique to identify a social media containing more number of positive respondents in recrui
... Show MoreThe depth of causative source of gravity is one of the most important parameter
of gravity investigation. Present study introduces the theoretical solve of the
intersection point of the horizontal and vertical gradients of gravity anomaly. Two
constants are obtained to estimate the depth of causative source of gravity anomaly,
first one is 1.7807 for spherical body and the second is 2.4142 for the horizontal
cylinder body. These constants are tested for estimating the depth of three actual
cases and good results are obtained. It is believed that the constants derived on
theoretical bases are better than those obtained by empirical experimental studies.
In this paper, Pentacene based-organic field effect transistors (OFETs) by using different layers (monolayer, bilayer and trilayer) for three different gate insulators (ZrO2, PVA and CYEPL) were studied its current–voltage (I-V) characteristics by using the gradual-channel approximation model. The device exhibits a typical output curve of a field-effect transistor (FET). Source-drain voltage (Vds) was also investigated to study the effects of gate dielectric on electrical performance for OFET. The effect of capacitancesemiconductor in performance OFETs was considered. The values of current and transconductance which calculated using MATLAB simulation. It exhibited a value of current increase with increasing source-drain voltage.
Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.