In this study, we used Bayesian method to estimate scale parameter for the normal distribution. By considering three different prior distributions such as the square root inverted gamma (SRIG) distribution and the non-informative prior distribution and the natural conjugate family of priors. The Bayesian estimation based on squared error loss function, and compared it with the classical estimation methods to estimate the scale parameter for the normal distribution, such as the maximum likelihood estimation and th
... Show MoreStumpff functions are an infinite series that depends on the value of z. This value results from multiplying the reciprocal semi-major axis with a universal anomaly. The purpose from those functions is to calculate the variation of the universal parameter (variable) using Kepler's equation for different orbits. In this paper, each range for the reciprocal of the semi-major axis, universal anomaly, and z is calculated in order to study the behavior of Stumpff functions C(z) and S(z). The results showed that when z grew, Stumpff functions for hyperbola, parabola, and elliptical orbits were also growing. They intersected and had a tendency towards zero for both hyperbola and parabola orbits, but for elliptical orbits, Stumpff functions
... Show MoreIn this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes
Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the
... Show MoreThis study explores the barriers to adopting green environmental criteria in Supplier Selection (SS) within the Iraqi food industry. It aims to enhance the understanding of sustainable supply chain management in developing nations, with a particular focus on the Iraqi context. A case study approach was utilized to identify eleven key green environmental criteria and 54 sub-criteria, alongside seven major barriers to their adoption. The Best–Worst Method (BWM) was employed to rank the criteria, and Fuzzy Stepwise Weight Assessment Ratio Analysis (SWARA) was used to prioritize the barriers. The analysis revealed that Environmental Management Systems are the most critical criterion for SS. On the other hand, legislation and policies emerged
... Show MoreWith the increase in industry and industrial products, quantities of waste have increased worldwide, especially plastic waste, as plastic pollution is considered one of the wastes of the modern era that threatens the environment and living organisms. On this basis, a solution must be found to use this waste and recycle it safely so that it does not threaten the environment. Therefore, this research used plastic waste as an improvement material for clay soil. In this research, two types of tests were conducted, the first of which was a laboratory test, where the undrained shear strength (cohesion), compression index (Cc), and swelling index (Cr) of the improved and unimproved soils were calculated (plastic was added in pr
... Show More