In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
Achieving goals effectively reflects the success of the institution. However, unless this indicator is coupled with efficiency when achieving goals, the institution will be equal in its achievements, and distinction will remain unachieved. Perhaps the role of the teaching staff in pushing the institution or college towards brilliance focuses on their ability to motivate people on the one hand and their interest in achieving brilliance for the institution. On the other hand, the importance of the research lies in the institution’s reaching a prominent position through the brilliance and creativity of teaching and achieving competition between institutions that make it more brilliance. The study seeks to achieve the goal of the real
... Show MoreThe study aims at studying and analyzing the subject of marketing vigilance as it is one of the modern approaches in the marketing field that can be used to face changes in the competitive and strategic environment and that represents quick reactions on the part of the institution to ensure its survival and distinctiveness other aims are: Consolidating the strength of the marketing organization and its success continuously, represented by changes in the market share, awareness of the institution's position in the market and its relations with competing tourism companies, diversification of tourism services, as well as an analysis of the competitive strategic position of tourism institutions for the purpose of conducting a r
... Show MoreThe process of coordination and joint cooperation between SAIs and internal auditors in the public sector is considered one of the very important matters in performing efficient audits and are of high quality, especially if this coordination and cooperation is implemented in accordance with international standards, as it leads to avoiding duplication in auditing work. And the distribution of work in a distribution that achieves the objectives of auditing in general and is of general benefit to the economic unit.
The research problem lies in the weakness of the relationship between internal auditing and external auditing as a result of not applying INTOSAI Standard (9150) coordination and joint cooperation
... Show MoreIt included the introduction to the research and its importance, as the knee joint is one of the important joints in the human body that are susceptible to injury, and among these injuries is the roughness of the knee that occurs as a result of weakness and imbalance in the work of the quadriceps muscle, so its treatment is through rehabilitation exercises to treat weakness and gain flexibility and strength.Hence the importance of the research by developing rehabilitation exercises with different resistances in the water medium and restoring flexibility and muscular strength for patients with knee roughness for ages from 30-40 years, and the experimental method was used to solve the research problem, and the research sample included (6) of
... Show MoreThis research explores the use of solid polymer electrolytes (SPEs) as a conductive medium for sodium ions in sodium‐ion batteries, presenting a possible alternative to traditional lithium‐ion battery technology. The researchers prepare SPEs with varying molecular weight ratios of polyacrylonitrile (PAN) and sodium tetrafluoroborate (NaBF4) using a solution casting method with dimethyl formamide as the solvent. Through optical absorbance measurements, we identified the PAN:NaBF4 (80:20) SPE composition as having the lowest energy band gap value (4.48 eV). This composition also exhibits high thermal stability based on thermogravimetric analysis results.
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show MoreEnsuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a
... Show MoreIn recent years, the demand for air travel has increased and many people have traveled by plane. Most passengers, however, feel stressed due to the limited cabin space. In order to make these passengers more comfortable, a personal air-conditioning system for the entire chair is needed. This is because the human body experiences discomfort from localized heating or cooling, and thus, it is necessary to provide appropriate airflow to each part of the body. In this paper, a personal air-conditioning system, which consists of six vertically installed air-conditioning vents, will be proposed. To clarify the setting temperature of each vent, the airflow around the passenger and the operative temperature of each part of the body is investigate
... Show MoreSecure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p
... Show More