In this research , we study the inverse Gompertz distribution (IG) and estimate the survival function of the distribution , and the survival function was evaluated using three methods (the Maximum likelihood, least squares, and percentiles estimators) and choosing the best method estimation ,as it was found that the best method for estimating the survival function is the squares-least method because it has the lowest IMSE and for all sample sizes
Abstract:In this research we prepared nanofibers by electrospinning from poly (Vinyl Alcohol) / TiO2. The spectrum of the solution (Emission) was studied at 772 nm. Several process parameter were Investigated as concentration of PVA, the effect of distance from nozzle tip to the grounded collector (gap distance), and final the effect of high voltage. We find the optimum condition to prepare a narrow nanofibers is at concentration of PVA 16gm, the fiber has 20nm diameter.
In this research we prepared nanofibers by electrospinning
from poly (Vinyl Alcohol) / TiO2. The spectrum of the solution
(Emission) was studied at 772 nm. Several process parameter were
Investigated as concentration of PVA, the effect of distance from
nozzle tip to the grounded collector (gap distance), and final the
effect of high voltage. We find the optimum condition to prepare a
narrow nanofibers is at concentration of PVA 16gm, the fiber has
20nm diameter
The main objective and primary concern to every investor not only to achieve a greater return on his or her investments, but also to create the largest possible value of these investments the, researchers and those interested in the field of investment and financial analysis try to develop standards for performance valuation is guided through the  
... Show MoreA novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh
... Show MoreThe hydraulic conditions of a flow previously proved to be changed when placing large-scale geometric roughness elements on the bed of an open channel. These elements impose more resistance to the flow. The geometry of the roughness elements, the numbers used, and the configuration are parameters that can affect the hydraulic flow characteristics. The target is to use inclined block elements to control the salt wedge propagation pointed in most estuaries to prevent its negative effects. The Computational Fluid Dynamics CFD Software was used to simulate the two-phase flow in an estuary model. In this model, the used block elements are 2 cm by 3 cm cross-sections with an inclined face in the flow direction, with a length
... Show MoreThe study aimed to reach the best rating for the views and variables in the totals characterized by qualities and characteristics common within each group and distinguish them from aggregates other for the purpose of distinguishing between Iraqi provinces which suffer from deprivation, for the purpose of identifying the status of those provinces in the early allowing interested parties and regulators to intervene to take appropriate corrective action in a timely manner. Style has been used cluster analysis Cluster analysis to reach the best rating to those totals from the provinces that suffer from problems, where the provinces were classified, based on the variables (Edu
... Show MoreThe subject of an valuation of quality of construction projects is one of the topics which it becomes necessary of the absence of the quantity standards in measuring the control works and the quality valuation standards in constructional projects. In the time being it depends on the experience of the workers which leads to an apparent differences in the valuation.
The idea of this research came to put the standards to evaluate the quality of the projects in a special system depending on quantity scale nor quality specifying in order to prepare an expert system “ Crystal “ to apply this special system to able the engineers to valuate the quality of their projects easily and in more accurate ways.
The paper probes into minute identification of the data of the methods followed in the electronic newspapers that aim to promote terrorist organizations like Al Qaeda and ISIS to draw emotional empathy and sympathy with them.
The paper aims at identifying:
How emotional empathy was utilized by terrorists in E-newspapers.
How useful utilizing emotional empathy was in attracting supporters. The sample that is used in the paper is based on the opening articles of E-newspapers that propagate Al Qaeda and ISIS, e.g. (Sawtu el jihad) “The Sound of Fighting in the Name of God”, (Mua’skar el Battar wal Shamikha wal Khansaa) “Camps of Al Battar, Shamika, and Khansaa”, “Inspire” and (Thurwatu el Sanam, Dabiq, and Rumiyah)