This paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.
Phlebotomus papatasi sand fly is the main vector of Zoonotic Cutaneous Leishmaniasis (ZCL) in Iraq. The aim of this study was to assess and predict the effects of climate change on the distribution of the cutaneous leishmaniasis (CL) cases and the main vector presently and in the future. Data of the CL cases were collected for the period (2000-2018) in addition to sand fly (SF) abundance. Geographic information system, R studio and MaxEnt (Maximum entropy niche model) software were used for analysis and predict effect of (elevation, population, Bio1-19, and Bio28-35) on CL cases distribution and SF occurrence. HadGEM2-ES model with two climate change scenarios, RCP 4.5 and RCP 8.5 were used for future projections 2050. The results showed th
... Show MoreShatt al-Arab is the only navigational artery in Iraq, extending from the city of Qurna to its mouth in the Arabian Gulf at the city of Al-Fao within the governorate of Basrah for a length of approximately 204 km. Its width ranges from 400 m to 2000 m, and its depth ranges from 8 m to 20 m. The southern part of it, 93 km long from Umm al-Rassas Island to Ras al-Bisha, represents the international border between Iraq and Iran, where the Thalweg line represents the border between the two countries, which is the deepest point in the riverbed (according to the 1975 Algiers Agreement). The western bank (the Iraqi side) within the common border of Shatt al-Arab is subject to continuous erosion, which leads to the shifting of t
... Show MoreDeepFake is a concern for celebrities and everyone because it is simple to create. DeepFake images, especially high-quality ones, are difficult to detect using people, local descriptors, and current approaches. On the other hand, video manipulation detection is more accessible than an image, which many state-of-the-art systems offer. Moreover, the detection of video manipulation depends entirely on its detection through images. Many worked on DeepFake detection in images, but they had complex mathematical calculations in preprocessing steps, and many limitations, including that the face must be in front, the eyes have to be open, and the mouth should be open with the appearance of teeth, etc. Also, the accuracy of their counterfeit detectio
... Show MoreObjective: The objectives of the present study were to evaluate the effectiveness of the instructional intervention
about medical and health knowledge of patients with diabetes mellitus type II.
Methodology: A Quasi- experimental study was carried out in National Center for Diabetes Mellitus/ Almustansria
University, started from 4th January 2012, to 1st April 2012. Non-probability (purposive sample) of (50) diabetes
mellitus type II, who visit National Center for Diabetes Mellitus/ Almustansria University. The study sample is
divided equally into (25) study and (25) control groups. The study group received the instructional intervention.
While the control not exposed to the instructional intervention. The data are coll
'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal
Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreProgression in Computer networks and emerging of new technologies in this field helps to find out new protocols and frameworks that provides new computer network-based services. E-government services, a modernized version of conventional government, are created through the steady evolution of technology in addition to the growing need of societies for numerous services. Government services are deeply related to citizens’ daily lives; therefore, it is important to evolve with technological developments—it is necessary to move from the traditional methods of managing government work to cutting-edge technical approaches that improve the effectiveness of government systems for providing services to citizens. Blockchain technology is amon
... Show More