This paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.
Background: Diabetes mellitus is a major health issue that is one of the leading causes of cardiovascular disease. Recent studies have found a link between uncontrolled diabetes and cardiovascular disease, with dyslipidaemia predicting glycated-hemoglobin (HbA1c), which could be a major contributor to type 2 diabetes complications and etiology.
Objectives: The objective of present study was estimate lipid profiles among control and uncontrolled type 2 diabetic patients.
Subjects and Methods: Analytical case control based study, One hundred twenty participate were included in study, 70 patients with DM as case group refer to Abuagala Center and difference follow up diabetic center and 50 non diabetic subjects taken as
... Show MoreAd-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot
... Show MoreIn this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images.
So, this study aimed at testing the system performance at poor s
... Show MoreIn this research, a study is introduced on the effect of several environmental factors on the performance of an already constructed quality inspection system, which was designed using a transfer learning approach based on convolutional neural networks. The system comprised two sets of layers, transferred layers set from an already trained model (DenseNet121) and a custom classification layers set. It was designed to discriminate between damaged and undamaged helical gears according to the configuration of the gear regardless to its dimensions, and the model showed good performance discriminating between the two products at ideal conditions of high-resolution images. So, this study aimed at testing the system performance at poo
... Show MoreSymmetric cryptography forms the backbone of secure data communication and storage by relying on the strength and randomness of cryptographic keys. This increases complexity, enhances cryptographic systems' overall robustness, and is immune to various attacks. The present work proposes a hybrid model based on the Latin square matrix (LSM) and subtractive random number generator (SRNG) algorithms for producing random keys. The hybrid model enhances the security of the cipher key against different attacks and increases the degree of diffusion. Different key lengths can also be generated based on the algorithm without compromising security. It comprises two phases. The first phase generates a seed value that depends on producing a rand
... Show MoreNutrient agar medium with various concentrations of cefotaxime was used for isolation spontaneous mutants from wild type strain of P.aeruginosa PHA-1. Eighty-two mutants were successfully isolated with the viable count 52×107 , these mutants were confirmed as spontaneous not physiological adaption mutants by reculture on the same medium. Then, wild type PHA-1 and mutants were examined for production pyocyanin; a blue greenish pigment was clearly noticed on King A medium. Remarkably the mutant strain named S300-8 was distinguished in productivity in comparison with wild type strain PHA-1; the amount of pigment was 56.0667mg/l and 74.53mg/l respectively. In addition, pyocyanin produced by mutant strain S300-8 revealed a potent efficacy again
... Show MoreWorld statistics proved that the most of work dangerous accidents, which causes death, are occurred in the construction works. These accidents related to many causes such as loss of workers experience and ignoring rules of safety requirements, especially young workers. Due to the risk of accidents that may occur in the site of work, the idea of this study crystallized to show the relationship between the age of worker and number of injuries and accidents, to identify the causes of these injuries, and to put the appropriate solutions to avoid or reduce the risk of work injuries. Also, the research shows the main principles of safety requirements to forming a clear picture about the subject of the study. A questioner form was prepared to c
... Show MoreBackground: A worldwide health epidemic, type 2 diabetes mellitus was significantly influenced by chronic inflammation, which led to increased insulin resistance (IR). The most widely practiced form of therapy used to control musculoskeletal pain in people with diabetes is non-steroidal anti-inflammatory drugs (NSAIDs), which provide their action by inhibiting cyclooxygenase enzyme (COX). COX1, COX2, and COX3 are distinct isoforms of the cyclooxygenase enzyme. The potential anti-inflammatory benefits of cyclooxygenase-2 (COX-2) inhibitors, both selective and non-selective, have been investigated concerning the management of type 2 diabetes patients. Objective: the purpose of this research is to explore the impact of highly selective
... Show MoreAbstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MorePermeability is an essential parameter in reservoir characterization because it is determined hydrocarbon flow patterns and volume, for this reason, the need for accurate and inexpensive methods for predicting permeability is important. Predictive models of permeability become more attractive as a result.
A Mishrif reservoir in Iraq's southeast has been chosen, and the study is based on data from four wells that penetrate the Mishrif formation. This study discusses some methods for predicting permeability. The conventional method of developing a link between permeability and porosity is one of the strategies. The second technique uses flow units and a flow zone indicator (FZI) to predict the permeability of a rock mass u
... Show More