Preferred Language
Articles
/
bsj-1471
Comparison of Maximum Likelihood and some Bayes Estimators for Maxwell Distribution based on Non-informative Priors
...Show More Authors

In this paper, Bayes estimators of the parameter of Maxwell distribution have been derived along with maximum likelihood estimator. The non-informative priors; Jeffreys and the extension of Jeffreys prior information has been considered under two different loss functions, the squared error loss function and the modified squared error loss function for comparison purpose. A simulation study has been developed in order to gain an insight into the performance on small, moderate and large samples. The performance of these estimators has been explored numerically under different conditions. The efficiency for the estimators was compared according to the mean square error MSE. The results of comparison by MSE show that the efficiency of Bayes estimators of the shape parameter of the Maxwell distribution decreases with the increase of Jeffreys prior constants. The results also show that values of Bayes estimators are almost close to the maximum likelihood estimator when the Jeffreys prior constants are small, yet they are identical in some certain cases. Comparison with respect to loss functions show that Bayes estimators under the modified squared error loss function has greater MSE than the squared error loss function especially with the increase of r.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
The European Physical Journal Applied Physics
A carbon nanotubes photoconductive detector for middle and far infrared regions based on porous silicon and a polyamide nylon polymer
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 31 2025
Journal Name
Joiv : International Journal On Informatics Visualization
RC5 Performance Enhancement Based on Parallel Computing
...Show More Authors

This study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti

... Show More
View Publication
Scopus Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Convergence Comparison of two Schemes for Common Fixed Points with an Application
...Show More Authors

      Some cases of common fixed point theory for classes of generalized nonexpansive maps are studied. Also, we show that the Picard-Mann scheme can be employed to approximate the unique solution of a mixed-type Volterra-Fredholm functional nonlinear integral equation.

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Mon May 20 2019
Journal Name
The Journal Of Engineering
Experimental comparison of two linear machines developed for the free piston engine
...Show More Authors

: In this study, a linear synchronous machine is compared with a linear transverse flux machine. Both machines have been designed and built with the intention of being used as the power take off in a free piston engine. As both topologies are cylindrical, it is not possible to construct either using just flat laminations and so alternative methods are described and demonstrated. Despite the difference in topology and specification, the machines are compared on a common base in terms of rated force and suitability for use as a generator. Experience gained during the manufacture of two prototypes is described.

View Publication Preview PDF
Crossref (9)
Clarivate Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Internal Fixation And Bone Grafting Of Non-Union Humeral Diaphyseal Fracture
...Show More Authors

Background: Humeral diaphyseal fracture usually
heals with closed methods but when nonunion
develops then it needs surgical intervention in the
form of plating and bone grafting, intramedulary
nailing (open or closed simple or interlocking nails)
and external fixators (circular or one plane fixator).
In our unit we treated non union humeral
diaphyseal fracture with plating and bone grafting
shortening of fracture ends up to 4 to 5cm when
needed. Methods: This study was conducted at
Orthopaedic Department of AL-Sadar General
Hospital from January 2004 till December2005 .
We included 20 cases with atrophic non-union in
12(60%) and hypertrophic non-union in 8 (40%)
patients. All atrophic non-union w

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 13 2011
Journal Name
Baghdad Science Journal
Using of Rustumiya sewage water for irrigation:1- its effect on some soil properties and corn growth
...Show More Authors

This study is conducted to investigate the validity of using different levels of Rustumiya sewage water for irrigation and their effects on corn growth and some of the chemical properties of the soil such as electrical conductivity and soil pH in extract soil paste , the micro nutrient content in soil and plant which are ( Fe , Mn , Zn , Cu , Cd , Pb ). Three levels of sewage water ( 0 , 50 , 100 )% in two stages were used ,the three levels of wastewater ( without soil fertilization ) were used in the first stage , Where 80 Kg N /D+50Kg P2O5 /D was added to the soil as fertilizer in the control (0%) treatment and 40 Kg N/D+25Kg P2O5/D were added to 50 and 100% levels in the second stage .Corn seeds were planted in 12kg plastic pots in Com

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Upstream Oil And Gas Technology
Integrated approach for non-Darcy flow in hydraulic fractures considering different fracture geometries and reservoir characteristics
...Show More Authors

Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
“Impress of rotation and an inclined MHD on waveform motion of the non-Newtonian fluid through porous canal”
...Show More Authors
Abstract<p>Waveform flow of non-Newtonian fluid through a porous medium of the non-symmetric sloping canal under the effect of rotation and magnetic force, which has applied by the inclined way, have studied analytically and computed numerically. Slip boundary conditions on velocity distribution and stream function are used. We have taken the influence of heat and mass transfer in the consideration in our study. We carried out the mathematical model by using the presumption of low Reynolds number and small wave number. The resulting equations of motion, which are representing by the velocity profile and stream function distribution, solved by using the method of a domain decomposition analysis a</p> ... Show More
View Publication
Scopus (10)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (12)
Scopus