In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.
The effect of adding sand on clayey soil shear strength is investigated in this study. Five different percentage of clay-sand mixtures are used; 100% clay with 0% sand termed 100C, 60% clay with 40% sand termed 60C-40S, 30% clay with 70% sand termed 30C-70S, 15% clay with 85% sand termed 15C-85S, and as well as 100% sand termed 100S. The used clay was obtained from Baghdad city in Iraq and classified as CH soil, while the used sand was taken from Al-Khider area from Iraq and classified as SW soil. The initial dry unit weight for all mixtures is 16 kN/m3. The results show that the variations of the soil shear strength properties with soil components content changes
The research’s main goal is to investigate the effects of using magnetic water in concrete mixes with regard to various mechanical properties such as compressive, flexural, and splitting tensile strength. The concrete mix investigated was designed to attain a specified cylinder compressive strength (30 MPa), with mix proportions of 1:1.8:2.68 cement to sand to crushed aggregate. The cement content was about 380 kg/m3, with a w/c ratio equal to 0.54, sand content of about 685 kg/m3, and gravel content of about 1,020 kg/m3. Magnetic water was prepared via passing ordinary water throughout a magnetic field with a magnetic intensity of 9,000 Gauss. The strength test
The Purpose of this research is a comparison between two types of multivariate GARCH models BEKK and DVECH to forecast using financial time series which are the series of daily Iraqi dinar exchange rate with dollar, the global daily of Oil price with dollar and the global daily of gold price with dollar for the period from 01/01/2014 till 01/01/2016.The estimation, testing and forecasting process has been computed through the program RATS. Three time series have been transferred to the three asset returns to get the Stationarity, some tests were conducted including Ljung- Box, Multivariate Q and Multivariate ARCH to Returns Series and Residuals Series for both models with comparison between the estimation and for
... Show MoreAccess to high-quality neurosurgery online learning is limited in low- and middle-income countries, and Iraq is part of this category. The need for collaboration and connection of people worldwide to exchange ideas and experiences in neurosurgery is a challenge. Surgical Neurology International® (SNI)/SNI Digital stimulated the establishment of the joint effort to bring the discussion about the best experiences in neurosurgery from the United States and Iraq together in an internet meeting format.
An online survey was formulated and distributed to the attendees of the SNI-Baghdad neurosurgery
Background: Rhabdomyolysis is a clinical and biochemical syndrome that occurs when skeletal muscle cells disrupt and release creatine phosphokinase and myoglobin into the interstitial space and plasma. The causes of rhabdomyolysis are legion, but the most important and the classical form is the crush syndrome. Acute kidney injury occurs in 33-50% of patients with rhabdomyolysis. Here we report nine cases with acute kidney injury due to crush injury with rhabdomyolysis after the Al-Aema bridge catastrophe in Baghdad, in September 2005.
Methods: Nine patients presented to the nephrology department of the Baghdad Teaching Hospital with a suggestive history of crush and laboratory evidence of rhabdomyolysis and acute kidney injury within
Background:
Pulmonary sequestration is a lung tissue (out of function), that received its blood supply from anomalous artery and not continuous with the tracheobronchial tree.
Aim:
To report a personal experience in dealing with five patients with pulmonary sequestration, due to anomalous arterial supply from the descending Thoracic Aorta ,ways of diagnosis and proper surgical management.
Patients and Methods:
Five patients with pulmonary sequestration, admitted, investigated and surgically managed at the department of Thoracic and Vascular surgery, in the surgical sub specialties hospital of the Medical City Teaching Complex d
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreAs a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show More