The research presents the reliability. It is defined as the probability of accomplishing any part of the system within a specified time and under the same circumstances. On the theoretical side, the reliability, the reliability function, and the cumulative function of failure are studied within the one-parameter Raleigh distribution. This research aims to discover many factors that are missed the reliability evaluation which causes constant interruptions of the machines in addition to the problems of data. The problem of the research is that there are many methods for estimating the reliability function but no one has suitable qualifications for most of these methods in the data such as the presence of anomalous values or extreme values or the appropriate distribution of these data is unknown. Therefore, the data need methods through which can be dealt with this problem. Two of the estimation methods have been used: the robust (estimator M) method and the nonparametric Kernel method. These estimation methods are derived to arrive at the formulas of their capabilities. A comparison of these estimations is made using the simulation method as it is implemented. Simulation experiments using different sample sizes and each experiment is repeated (1000) times to achieve the objective. The results are compared by using one of the most important statistical measures which is the mean of error squares (MSE). The best estimation method has been reached is the robust (M estimator) method. It has been shown that the estimation of the reliability function gradually decreases with time, and this is identical to the properties of this function.
Steganography is one of the most popular techniques for data hiding in the different media such as images, audio or video files. This paper introduced the improved technique to hide the secret message using the LSB algorithm inside the RGB true color image by encrypting it using the secret key transformation function. The key is selecting randomly in the GF (2n) with condition it has an inverse value to retrieve the encrypted message. Only two bits are used for the low byte in each pixel (the blue byte) to hide the secret message, since the blue color has a weak effect on human eyes. The message hidden by the suggested algorithm is less vulnerable to be stolen than other similar applications.
This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.
According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability
p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive
preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the
average durations of the preventive and corrective maintenance actions a
... Show MoreIn this paper a new technique based on dynamic stream cipher algorithm is introduced. The mathematical model of dynamic stream cipher algorithm is based on the idea of changing the structure of the combined Linear Feedback Shift Registers (LFSR's) with each change in basic and message keys to get more complicated encryption algorithm, and this is done by use a bank of LFSR's stored in protected file and we select a collection of LFSR's randomly that are used in algorithm to generate the encryption (decryption) key.
We implement Basic Efficient Criteria on the suggested Key Generator (KG) to test the output key results. The results of applying BEC prove the robustness and efficiency of the proposed stream cipher cryptosystem.
This paper concerned with estimation reliability ( for K components parallel system of the stress-strength model with non-identical components which is subjected to a common stress, when the stress and strength follow the Generalized Exponential Distribution (GED) with unknown shape parameter α and the known scale parameter θ (θ=1) to be common. Different shrinkage estimation methods will be considered to estimate  depending on maximum likelihood estimator and prior estimates based on simulation using mean squared error (MSE) criteria. The study approved that the shrinkage estimation using shrinkage weight function was the best.
This research foxed on the effect of fire flame of different burning temperatures (300, 400 and 500)oC on the compressive strength of reactive powder concrete (RPC).The steady state duration of the burning test was (60)min. Local consuming material were used to mixed a RPC of compressive strength around (100) MPa. The tested specimens were reinforced by (3.0) cm hooked end steel fiber of (1100) MPa yield strength. Three steel fiber volume fraction were adopted in this study (0, 1.0and 1.5)% and two cooling process were included, gradual and sudden. It was concluding that increasing burning temperature decreases the residual compressive strength for RPC specimens of(0%) steel fiber volume fraction by (12.16, 19.46&24.49) and (18.20, 27.77 &3
... Show MoreThe m-consecutive-k-out-of-n: F linear and circular system consists of n sequentially connected components; the components are ordered on a line or a circle; it fails if there are at least m non-overlapping runs of consecutive-k failed components. This paper proposes the reliability and failure probability functions for both linearly and circularly m-consecutive-k-out-of-n: F systems. More precisely, the failure states of the system components are separated into two collections (the working and the failure collections); where each one is defined as a collection of finite mutual disjoint classes of the system states. Illustrative example is provided.
Soil acts as a last sink for elements that people release into the environment through a range of activities due to its physiochemical characteristics. These substances, whether are organic or mineral pollutants, accumulate in the soil and constitute a significant risk to the ecosystem in general because they mess with the chemical and physical equilibrium of the soil, get into the food chain, and eventually get to people. When pollutant concentrations during the bioaccumulated process exceed the global standards for what is regarded as a contaminant in water, air, and soil. Nine soil samples were collected from different sites and two samples from each site at two depths (0-20 and 20-40 cm) to determine if there were any
... Show MoreThis work aimed to estimate the frequency of mitochondrial inborn errors of metabolism (MIEMs) in patients presenting with family history and IEM-picture who referred for advance IEM assay in Mosul province and Kurdistan region. This study was observational study conducted on 364 cases referred from different general /or private pediatric clinics with unexplained sign and symptoms and suspension of mitochondrial dysfunction. The study included 364 children with an age ranging from 1 month to 1 year. Started from January 2018 to January 2020. All patients referred with their full history review, notes about their clinical examination, and laboratory investigations including blood ammonia, serum lactate/ pyruvate, arterial blood gases. In
... Show MoreRecently, the development and application of the hydrological models based on Geographical Information System (GIS) has increased around the world. One of the most important applications of GIS is mapping the Curve Number (CN) of a catchment. In this research, three softwares, such as an ArcView GIS 9.3 with ArcInfo, Arc Hydro Tool and Geospatial Hydrologic Modeling Extension (Hec-GeoHMS) model for ArcView GIS 9.3, were used to calculate CN of (19210 ha) Salt Creek watershed (SC) which is located in Osage County, Oklahoma, USA. Multi layers were combined and examined using the Environmental Systems Research Institute (ESRI) ArcMap 2009. These layers are soil layer (Soil Survey Geographic SSURGO), 30 m x 30 m resolution of Digital Elevati
... Show MoreIn recent years, the consideration of natural products as anti-inflammatory and antioxidative treatments has more interested worldwide. Moreover, natural products are easily obtained and are relatively safe the Royal jelly (RJ) is one of them. The current study was carried to evaluate the effects of pregabalin (PGB) on physiological activity of sperms, reproductive hormones assay and some biochemical analysis. Forty (40) male albino rats (10-weeks-old) were divided into four groups (10 rats each): G1 (treated with PGB drug, 150 mg/kg B.wt (Lyrica-Pfizer-Pharmaceutical Industries), G2 (treated with RJ 1g/kg), G3 (treated with PGB drug and RJ together), and G4 control treated with norma