Survival analysis is one of the types of data analysis that describes the time period until the occurrence of an event of interest such as death or other events of importance in determining what will happen to the phenomenon studied. There may be more than one endpoint for the event, in which case it is called Competing risks. The purpose of this research is to apply the dynamic approach in the analysis of discrete survival time in order to estimate the effect of covariates over time, as well as modeling the nonlinear relationship between the covariates and the discrete hazard function through the use of the multinomial logistic model and the multivariate Cox model. For the purpose of conducting the estimation process for both the discrete hazard function and the time-dependent parameters, two estimation methods have been used that depend on the Bayes method according to dynamic modeling: the Maximum A Posterior method (MAP) This method was done using numerical methods represented by a Iteratively Weighted Kalman Filter Smoothing (IWKFS) and in combination with the Expectation maximization algorithm (EM), the other method is represented by the Hybrid Markov Chains Monte Carlo (HMCMC) method using the Metropolis Hasting algorithm (MH) and Gypsum sampling (GS). It was concluded that survival analysis by descretization the data into a set of intervals is more flexible and fluid, as this allows analyzing risks and diagnosing impacts that vary over time. The study was applied in the survival analysis on dialysis until either death occurred due to kidney failure or the competing event, represented by kidney transplantation. The most important variables affecting the patient’s cessation of dialysis were also identified for both events in this research.
In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains
Digital forensic is part of forensic science that implicitly covers crime related to computer and other digital devices. It‟s being for a while that academic studies are interested in digital forensics. The researchers aim to find out a discipline based on scientific structures that defines a model reflecting their observations. This paper suggests a model to improve the whole investigation process and obtaining an accurate and complete evidence and adopts securing the digital evidence by cryptography algorithms presenting a reliable evidence in a court of law. This paper presents the main and basic concepts of the frameworks and models used in digital forensics investigation.
Android operating system, since its first start, is growing very fast and takes a large space in smart devices market. It is built and developed on Linux and designed basically for touch screen devices such as, mobiles, tablets, etc. Mobile devices are markedly complicated and feature-rich; therefore they are prone to reliability of software and performance problems. Because of the small resources, smart devices, such as CPU, RAM, suffer from problems. One of these problems is Software Aging (SA). SA is recognized in long running OSs as a shortage in resources, performance retreating, and finally failure. SA is looked at from two sides, namely the poor response time of application which represents the end user side and the shortage in me
... Show MoreIn this paper, we use the definition of the action on the set of semi-group of the structure of this research .We introduce the concepts of -system which is a triple , , such that is a Hausdorff compact space called phase space, is a semi-group of transformations with a continuous action of on . We study and proof some theoretical properties related with that system. We also introduce the concept of Enfolding semi-group ( , ,and we prove that it is a compact right topological semi-group. In addition, we study the left and right ideals in the Enfolding semi-group. By using the dynamical system, we reflect various properties concerning with its structure for the Enfolding semi-group. Furthermore, we describe
... Show MoreThe strong cryptography employed by PGP (Pretty Good Privacy) is one of the best available today. The PGP protocol is a hybrid cryptosystem that combines some of the best features of both conventional and public-key cryptography. This paper aim to improve PGP protocol by combined between the Random Genetic algorithm, NTRU (N-th degree Truncated polynomial Ring Unit) algorithm with PGP protocol stages in order to increase PGP protocol speed, security, and make it more difficult in front of the counterfeiter. This can be achieved by use the Genetic algorithm that only generates the keys according to the Random Genetic equations. The final keys that obtained from Genetic algorithm were observed to be purely random (according to the randomne
... Show MoreIn this manuscript, the effect of substituting strontium with barium on the structural properties of Tl0.8Ni0.2Sr2-xBrxCa2Cu3O9-δcompound with x= 0, 0.2, 0.4, have been studied. Samples were prepared using solid state reaction technique, suitable oxides alternatives of Pb2O3, CaO, BaO and CuO with 99.99% purity as raw materials and then mixed. They were prepared in the form of discs with a diameter of 1.5 cm and a thickness of (0.2-0.3) cm under pressures 7 tons / cm2, and the samples were sintered at a constant temperature o
... Show MoreThe bandwidth requirements of telecommunication network users increased rapidly during the last decades. Optical access technologies must provide the bandwidth demand for each user. The passive optical access networks (PONs) support a maximum data rate of 100 Gbps by using the Orthogonal Frequency Division Multiplexing (OFDM) technique in the optical access network. In this paper, the optical broadband access networks with many techniques from Time Division Multiplexing Passive Optical Networks (TDM PON) to Orthogonal Frequency Division Multiplex Passive Optical Networks (OFDM PON) are presented. The architectures, advantages, disadvantages, and main parameters of these optical access networks are discussed and reported which have many ad
... Show MoreAudio classification is the process to classify different audio types according to contents. It is implemented in a large variety of real world problems, all classification applications allowed the target subjects to be viewed as a specific type of audio and hence, there is a variety in the audio types and every type has to be treatedcarefully according to its significant properties.Feature extraction is an important process for audio classification. This workintroduces several sets of features according to the type, two types of audio (datasets) were studied. Two different features sets are proposed: (i) firstorder gradient feature vector, and (ii) Local roughness feature vector, the experimentsshowed that the results are competitive to
... Show MoreThe adsorption behavior of congo red dye from its aqueous solutions was investigated onto natural and modified bauxite clays. Both bauxite and modified bauxite are primarily characterized by using, FTIR, SEM, AFM, and XRD. Several variables are studied as a function of adsorption including contact time, adsorbent weight, pH, ionic strength, particle size and temperature under batch adsorption technique. The absorbance of the solution before and after adsorption was measured spectrophotometrically. The equilibrium data fit with Langmuir model of adsorption and the linear regression coefficient R2 is found to be 0.9832 and 0.9630 for natural and modified bauxite respectively at 37.5°C which elucidate the best fitting isotherm model. The gene
... Show MoreIn this research, a new application has been developed for games by using the generalization of the separation axioms in topology, in particular regular, Sg-regular and SSg- regular spaces. The games under study consist of two players and the victory of the second player depends on the strategy and choice of the first player. Many regularity, Sg, SSg regularity theorems have been proven using this type of game, and many results and illustrative examples have been presented