This study includes Estimating scale parameter, location parameter and reliability function for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).
Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)
... Show MoreThe results shows existence of metals such as copper, iron, Cadmium, lead and zinc in most of examined samples , the highest concentration are up to (2.26, 40.82, 282.5, 31.02, 19.26, 4.34) Part per million) ppm) in pasta hot (Zer brand), Indomie with chicken, granule (Zer brand), brand (Zer brand), and rice (mahmood brand) respectively, with presence nickel in spaghetti( Zer brand), granule, Zer brand with concentration reached to 4.34 ppm and 1.06 ppm respectively.
The results of cereals group and its products show that two kinds of fungi, Aspergillus spp. and Penicillin spp. were found in rice (Mahmood brand) with numbers got to 1.5×103 Colony Forming Unit/ gram (c.f.u./g),while Bacillus cereus and Staphylococcus aureus were isola
The main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular,
. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation by using monte carlo simulation technique .. It was obse
... Show MoreAlthough severe epistaxis is uncommon, it is serious. The systematic endoscopic nasal examination is an essential step in identifying the bleeding point and aiding electrocauterization. Currently, the S-point, which is located in the superior part of the nasal septum behind the septal body and corresponding to the axilla of the middle concha, is identified in about 30% of cases with severe epistaxis. Cauterization of this point has an excellent rate of controlling the bleeding and preventing its recurrence. We aimed to highlight the significance of the S-point in the management of severe cases of epistaxis.
Background: Malignant lymphomas represent about 5% of all malignancy of the head and neck region which can involve lymph nodes as well as soft tissue and bone of the maxillofacial region. Apoptosis is considered a vital component of various processes including normal cell turnover, proper development and functioning of the immune system. Inappropriate apoptosis is a factor in many human conditions including neurodegenerative diseases, ischemic damage, autoimmune disorders and many types of cancer. Expression of p53 Proteins in Hodgkin׳s and Non Hodgkin׳s lymphomas suggested that it can help in monitoring of patients and the markers may aid in controlling the progression of lymphoma and detect the degree of aggressiveness of the diseas
... Show MoreIn this paper, we introduce a new class of sets, namely , s*g-ï¡-open sets and we show that the family of all s*g-ï¡-open subsets of a topological space ) ,X( ï´ from a topology on X which is finer than ï´ . Also , we study the characterizations and basic properties of s*g-ï¡open sets and s*g-ï¡-closed sets . Moreover, we use these sets to define and study a new class of functions, namely , s*g- ï¡ -continuous functions and s*g- ï¡ -irresolute functions in topological spaces . Some properties of these functions have been studied .
Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc
... Show Moreفي تعزيز بيئة الانتاج الرشيق استخدام اسلوب S -5
In our current era, women need to practice sports activities in order to compensate for the lack of movement. The development of life and the introduction of technology in all fields contributed to reducing body movements to the maximum. Many movements were also shortened, and some parts of the body became almost static. All machines became available in homes. Necessary to help women clean and cook. The presence of transportation also restricted women, so the walking sport that women used to practice when they went shopping in nearby places or to visit friends disappeared. As a result, many health problems emerged, prompting some developed countries to allocate financial aid with the help of insurance companies to these patients.The researc
... Show More