Abstract
The Non - Homogeneous Poisson process is considered as one of the statistical subjects which had an importance in other sciences and a large application in different areas as waiting raws and rectifiable systems method , computer and communication systems and the theory of reliability and many other, also it used in modeling the phenomenon that occurred by unfixed way over time (all events that changed by time).
This research deals with some of the basic concepts that are related to the Non - Homogeneous Poisson process , This research carried out two models of the Non - Homogeneous Poisson process which are the power law model , and Musa –okumto , to estimate th
... Show MoreCoronavirus disease (COVID-19), which is caused by SARS-CoV-2, has been announced as a global pandemic by the World Health Organization (WHO), which results in the collapsing of the healthcare systems in several countries around the globe. Machine learning (ML) methods are one of the most utilized approaches in artificial intelligence (AI) to classify COVID-19 images. However, there are many machine-learning methods used to classify COVID-19. The question is: which machine learning method is best over multi-criteria evaluation? Therefore, this research presents benchmarking of COVID-19 machine learning methods, which is recognized as a multi-criteria decision-making (MCDM) problem. In the recent century, the trend of developing
... Show More
In The Bluest Eye (1970), the American-African writer, Toni Morrison explores how
Western standards of ideal beauty are created and propagated with and among the black
community. The novel not only portrays the lives of those whose dark skinned and Negroid
features blight their lives; it also shows how the standard of white beauty, when imposed on
black youth, can drastically damage one’s self-love and esteem which usually occurs when
beauty goes unrecognized. Morrison in this novel focuses on the damage that the black
women characters suffer through the construction of femininity in a racialised society where
whiteness is used as a standard of beauty.
This study carry’s out the correlation and the effect of two main variables, these variables are Job Satisfaction included six sub: wages - salaries and justice and yield, working conditions and services, pattern of supervision and the relationship with the manger, Relationship with colleagues, the content of the work and the variety of tasks, development and promotion opportunities available to an individual, and Organizational Performance included two sub variables: Efficiency, Effectiveness. This research was conducted using a questioner as a main tool, This questioner was distributed randomly to a research community composed of
... Show MoreThe influence of an aortic aneurysm on blood flow waveforms is well established, but how to exploit this link for diagnostic purposes still remains challenging. This work uses a combination of experimental and computational modelling to study how aneurysms of various size affect the waveforms. Experimental studies are carried out on fusiform-type aneurysm models, and a comparison of results with those from a one-dimensional fluid–structure interaction model shows close agreement. Further mathematical analysis of these results allows the definition of several indicators that characterize the impact of an aneurysm on waveforms. These indicators are then further studied in a computational model of a systemic blood flow network. This demonstr
... Show MoreIn this paper, the homotopy perturbation method is presented for solving the second kind linear mixed Volterra-Fredholm integral equations. Then, Aitken method is used to accelerate the convergence. In this method, a series will be constructed whose sum is the solution of the considered integral equation. Convergence of the constructed series is discussed, and its proof is given; the error estimation is also obtained. For more illustration, the method is applied on several examples and programs, which are written in MATLAB (R2015a) to compute the results. The absolute errors are computed to clarify the efficiency of the method.
This research aims to develop new spectrophotometric analytical method to determine drug compound Salbutamol by reaction it with ferric chloride in presence potassium ferricyanide in acid median to formation of Prussian blue complex to determine it by uv-vis spectrophotmetric at wavelengths rang(700-750)nm . Study the optimal experimental condition for determination drug and found the follows: 1- Volume of(10M) H2SO4 to determine of drug is 1.5 ml . 2- Volume and concentration of K3Fe(CN)6 is 1.5 ml ,0.2% . 3- Volume and concentration of FeCl3 is 2.5ml , 0.2%. 4- Temperature has been found 80 . 5- Reaction time is 15 minute . 6- Order of addition is (drug + K3Fe(CN)6+ FeCl3 + acid) . Concentration rang (0.025-5 ppm) , limit detecti
... Show MoreIn this paper, suggested method as well as the conventional methods (probability
plot-(p.p.) for estimations of the two-parameters (shape and scale) of the Weibull
distribution had proposed and the estimators had been implemented for different
sample sizes small, medium, and large of size 20, 50, and 100 respectively by
simulation technique. The comparisons were carried out between different methods
and sample sizes. It was observed from the results that suggested method which
were performed for the first time (as far as we know), by using MSE indicator, the
comparisons between the studied and suggested methods can be summarized
through extremely asymptotic for indicator (MSE) results by generating random
error
Symmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show More