In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
Abstract
The critical success factors of the means of the most modern in determining the main directions for organizations to achieve competitive advantage. and can be a critical success factors in organizations that overlap in the functional areas of the organization. that successful organizations use these factors to get to the uniqueness and distinction. as the entrance of critical success factors with the capacity Evaluative phase correction because discovery increases the perception of managers of what is important to the organization and using them to get to the Strategic Entrepreneurship. as it begins in terms of permanence of success and
... Show MoreThe petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli
... Show MoreEach phenomenon contains several variables. Studying these variables, we find mathematical formula to get the joint distribution and the copula that are a useful and good tool to find the amount of correlation, where the survival function was used to measure the relationship of age with the level of cretonne in the remaining blood of the person. The Spss program was also used to extract the influencing variables from a group of variables using factor analysis and then using the Clayton copula function that is used to find the shared binary distributions using multivariate distributions, where the bivariate distribution was calculated, and then the survival function value was calculated for a sample size (50) drawn from Yarmouk Ho
... Show MoreWater supply networks are marred by serious risks of imperceptible pipeline leakage, posing sustainability and performance threats. This article highlights the use of vibratory signal features to get around the drawbacks of traditional methods in a highly detailed framework for leak detection based on CatBoost. demonstrated excellent diagnostic performance and carried out a thorough test performance evaluation on five leakage configurations . The expected system achieved an accuracy of 98.1% (variance (well within x/3% of expected):, beating traditional competitors such as Random Forest (97.3%) and Support Vector Machine (93.8%). For example, the area under the receiver-operating characteristic curve was 0.995, in
... Show MoreThis research basically gives an introduction about the multiple intelligence
theory and its implication into the classroom. It presents a unit plan based upon the
MI theory followed by a report which explains the application of the plan by the
researcher on the first class student of computer department in college of sciences/
University of Al-Mustansiryia and the teacher's and the students' reaction to it.
The research starts with a short introduction about the MI theory is a great
theory that could help students to learn better in a relaxed learning situation. It is
presented by Howard Gardener first when he published his book "Frames of
Minds" in 1983 in which he describes how the brain has multiple intelligen
To assess the biochemical, mechanical and structural characteristics of retained dentin after applying three novel bromelain‑contained chemomechanical caries removal (CMCR) formulations in comparison to the conventional excavation methods (hand and rotary) and a commercial papain‑contained gel (Brix 3000). Seventy‑two extracted permanent molars with natural occlusal carious lesions (score > 4 following the International Caries Detection and Assessment System (ICDAS‑II)) were randomly allocated into six groups (n = 12) according to the excavation methods: hand excavation, rotary excavation, Brix 3000, bromelain‑contained gel (F1), bromelain‑chloramine‑T (F2), and bromelain chlorhexidine gel (F3). The superficial and deepe
... Show MorePatients infected with the COVID-19 virus develop severe pneumonia, which typically results in death. Radiological data show that the disease involves interstitial lung involvement, lung opacities, bilateral ground-glass opacities, and patchy opacities. This study aimed to improve COVID-19 diagnosis via radiological chest X-ray (CXR) image analysis, making a substantial contribution to the development of a mobile application that efficiently identifies COVID-19, saving medical professionals time and resources. It also allows for timely preventative interventions by using more than 18000 CXR lung images and the MobileNetV2 convolutional neural network (CNN) architecture. The MobileNetV2 deep-learning model performances were evaluated
... Show MoreBotnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet
... Show More