In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
The Weibull distribution is considered one of the Type-I Generalized Extreme Value (GEV) distribution, and it plays a crucial role in modeling extreme events in various fields, such as hydrology, finance, and environmental sciences. Bayesian methods play a strong, decisive role in estimating the parameters of the GEV distribution due to their ability to incorporate prior knowledge and handle small sample sizes effectively. In this research, we compare several shrinkage Bayesian estimation methods based on the squared error and the linear exponential loss functions. They were adopted and compared by the Monte Carlo simulation method. The performance of these methods is assessed based on their accuracy and computational efficiency in estimati
... Show MoreA simple, sensitive and rapid method was used for the estimate of: Propranolol with Bi (III) to prove the efficiency, reliability and repeatability of the long distance chasing photometer (NAG-ADF-300-2) using continuous flow injection analysis. The method is based on a reaction between propranolol and Bi (III) in an aqueous medium to obtain a yellow precipitate. Optimum parameters were studied to increase the sensitivity for the developed method. A linear range for calibration graph was 0.1-25 mmol/L for cell A and 1-40 mmol/L for cell B, and LOD 51.8698 ng/200 µL and 363.0886 ng /200 µL , respectively to cell A and cell B with correlation coefficient (r) 0.9975 for cell A, 0.9966 for cell B, RSD% was lower than 1%, (n = 8) for the
... Show MoreContracting companies play a prominent role today in economic activity, due to their contribution to the implementation of major construction projects which together constitute the infrastructure of society. Most construction projects also suffer from exceeding the time and cost specified and planned for the completion of the project, and this comes for several reasons, including the work environment, country conditions, The method of managing project costs and the techniques used in its implementation Accordingly, the concepts of lean construction came, which help in addressing the causes of waste, both in time and cost, in addition to the fact that project management needs techniques that are useful in controlling the control and manag
... Show MoreCurrent research sought to evaluate the performance and results of employees in accordance with normative to people and people result for the European model of excellence EFQM 2013 quality management Foundation in the Inspector General's Office/Ministry of health, so as to pursue a modern and advanced management methods in evaluating performance and the performance of the Office's relationship with a citizen's life, since it takes him beyond the accepted service capabilities today, but it became budget duties between dealers servicing responsibilities and future planning, financial control, competitiveness, human resources needs and maintaining quality and continuous improvement and development as well as The primary role of the
... Show MoreAbstract:
Current research has sought to apply the criteria of potential for altmizalaorbi model EFQM 2013 in assessing the performance of the Inspector General's Office/Ministry of health, so as to keep up with a modern and advanced management methods in the evaluation of performance, as well as to link performance to a citizen's life, and it takes him beyond the accepted service capabilities today, but of budget duties between dealers servicing responsibilities and future planning, financial control, competitiveness, human resources needs and maintaining quality and development, as well as the constant quest for continuous improvement, is the spirit of the principle underpinning the European Foundation Quality managemen
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed
... Show MorePolarization manipulation elements operating at visible wavelengths represent a critical component of quantum communication sub-systems, equivalent to their telecom wavelength counterparts. The method proposed involves rotating the optic axis of the polarized input light by an angle of 45 degree, thereby converting the fundamental transverse electric (TE0) mode to the fundamental transverse magnetic (TM0) mode. This paper outlines an integrated gallium phosphide-waveguide polarization rotator, which relies on the rotation of a horizontal slot by 45 degree at a wavelength of 700 nm. This will ultimately lead to the conception of a mode hybridization phenomeno
Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper