In the current work, the mixing ratios ( 𝛿 ) of gamma transitions were calculated from energy levels in the isotopes neodymium 60𝑁𝑎 142−150 populated in the 60Nd 142− 150 (n, n ˊγ) 60Nd 142− 150 using the 𝑎2 ratio method. We used the experimental coefficient (𝑎2 ) for two γ-transitions from the initial state itself, the statistical tensor 𝜌2(𝐽𝑖), associated with factor 𝑎2 , would be the same for the two transitions. The results obtained are in good agreement or within the experimental error with -those previously published. And existing contradictions resulting from inaccuracies in the empirical results of previous work. The current results confirm that the , 𝑎2 − method is used to calculate the values of mixing ratios and the feasibility of this method in predicting errors in experimental results
The 3-parameter Weibull distribution is used as a model for failure since this distribution is proper when the failure rate somewhat high in starting operation and these rates will be decreased with increasing time .
In practical side a comparison was made between (Shrinkage and Maximum likelihood) Estimators for parameter and reliability function using simulation , we conclude that the Shrinkage estimators for parameters are better than maximum likelihood estimators but the maximum likelihood estimator for reliability function is the better using statistical measures (MAPE)and (MSE) and for different sample sizes.
Note:- ns : small sample ; nm=median sample
... Show MoreAryl hydrocarbon receptor (AhR) is a ligand-activated transcription factor that regulates T cell function. The aim of this study was to investigate the effects of AhR ligands, 2,3,7,8-Tetrachlorodibenzo-p-dioxin (TCDD), and 6-Formylindolo[3,2-b]carbazole (FICZ), on gut-associated microbiota and T cell responses during delayed-type hypersensitivity (DTH) reaction induced by methylated bovine serum albumin (mBSA) in a mouse model. Mice with DTH showed significant changes in gut microbiota including an increased abundance of
Generally, statistical methods are used in various fields of science, especially in the research field, in which Statistical analysis is carried out by adopting several techniques, according to the nature of the study and its objectives. One of these techniques is building statistical models, which is done through regression models. This technique is considered one of the most important statistical methods for studying the relationship between a dependent variable, also called (the response variable) and the other variables, called covariate variables. This research describes the estimation of the partial linear regression model, as well as the estimation of the “missing at random” values (MAR). Regarding the
... Show MoreIntroduction: Cerebral hydatid disease (CHD) is rare and the multiple-cystic variety is even rarer. In this paper, we report a case of multiple CHD and explore a possible link with a preceding spontaneous intracerebral haemorrhage (ICH). Case presentation: A 27-year old gentleman with a history of surgically-evacuated, spontaneous ICH presented with severe headache, left-sided weakness - Medical Research Council (MRC) grade II - and recurrent tonic-clonic seizures, while on a full dose of anti-epileptic medication. Brain magnetic resonance imaging (MRI) scans showed multiple intra-axial cystic lesions in the right hemisphere. The cysts were removed intact using Dowling’s technique through a large temporoparietal crani
... Show MoreObjectives: The aim of this study was to assess the possible the association between +3061 (G>A, rs1143676) missense mutation in exon 24 of the integrin α-4 subunit (ITGA-4) gene and the response to natalizumab in a sample of Iraqi multiple sclerosis patients. Methods: A sample of 59 patients with multiple sclerosis (16 males and 43 females; mean age of 32 years; age range of 15 to 52 years) receiving natalizumab for at least 12 consecutive months were involved in the study between March and August/ 2022. The sample was categorized into two groups according to their response to natalizumab treatment (responders and non-responders). Polymerase chain reaction and Sanger’s sequencing for the extracted deoxyribonucleic acid was pe
... Show MoreThe study involved the removal of acidity from free fatty acid via the esterification reaction of oleic acid with ethanol. The reaction was done in a batch reactor using commercial 13X zeolite as a catalyst. The effects of temperatures (40 to 70 °C) and reaction time (up to 120 minutes) were studied using 6:1 mole ratio of pure ethanol to oleic acid and 5 wt. % of the catalyst. The results showed that acid removed increased with increasing temperature and reaction time. Also, the acidity removal rises sharply during the first reaction period and then changes slightly afterward. The highest acidity removal value was 67 % recorded at 110 minutes and 70 °C. An apparent homogeneous reversible reaction kinetic model has been proposed a
... Show MoreThe effect of Wood Flour addition to the gamma alumina powder used in the preparation of gamma alumina (ɤ-Al2O3) catalyst carrier extrudates on the pore volume and BET surface area physical properties was investigated. Two parameters which are size of wood flour particles and its quantity were studied. The sizes of wood flour particles used are 150 µm, 212 µm and 500 µm and the weight percentage added to the gamma alumina powder during the preparation of the extrudates are (1%, 3%, 5% and 10%). The results showed that the addition of wood flour to the gamma alumina powder in order to get gamma alumina extrudates used as catalyst carrier is one of the successful methods to improve the pore volume
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show More