Preferred Language
Articles
/
bsj-3011
Comparing Weibull Stress – Strength Reliability Bayesian Estimators for Singly Type II Censored Data under Different loss Functions
...Show More Authors

     The stress(Y) – strength(X) model reliability Bayesian estimation which defines life of a component with strength X and stress Y (the component fails if and only if at any time the applied stress is greater than its strength) has been studied, then the reliability; R=P(Y<X), can be considered as a measure of the component performance. In this paper, a Bayesian analysis has been considered for R when the two variables X and Y are independent Weibull random variables with common parameter α in order to study the effect of each of the two different scale parameters β and λ; respectively, using three different [weighted, quadratic and entropy] loss functions under two different prior functions [Gamma and extension of Jeffery] and also an empirical Bayes estimator Using Gamma Prior, for singly type II censored sample. An empirical study has been used to make a comparison between the three estimators of the reliability for stress – strength Weibull model, by mean squared error MSE criteria, taking different sample sizes (small, moderate and large) for the two random variables in eight experiments of different values of their parameters. It has been found that the weighted loss function was the best for small sample size, and the entropy and Quadratic were the best for moderate and large sample sizes under the two prior distributions and for empirical Bayes estimation.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Performance Improvement of Neural Network Based RLS Channel Estimators in MIMO-OFDM Systems
...Show More Authors

The objective of this study was tointroduce a recursive least squares (RLS) parameter estimatorenhanced by using a neural network (NN) to facilitate the computing of a bit error rate (BER) (error reduction) during channels estimation of a multiple input-multiple output orthogonal frequency division multiplexing (MIMO-OFDM) system over a Rayleigh multipath fading channel.Recursive least square is an efficient approach to neural network training:first, the neural network estimator learns to adapt to the channel variations then it estimates the channel frequency response. Simulation results show that the proposed method has better performance compared to the conventional methods least square (LS) and the original RLS and it is more robust a

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Chemical And Process Engineering Research
Synthesis and Characterization of Complexes of Schiff Base [1, 2-Diphenyl -2- 2-{[1-(3-Amino-Phenyl)-Ethylidene]-Hydrazono Methyl}-Phenol] with Mn(II), Fe(II), Co(II), Cu(II), Zn(II), Cd(II), Ni(II), and Hg(II) Ions
...Show More Authors

The new tridentate Schiff base ligand (HL)namely 2-{[1-(3-amino-phenyl)-ethylidene]-hydrazono methyl}- phenol containing (N N O)as donors atoms was prepared in two steps:Step (1): By the reaction of 3- aminoacetophenone with hydrazine monohydrate under reflux in methanol and drops of glacial acetic acid gave the intermediate compound 3-(1- hydrazono ethyl)-phenol amine.Step (2): By the reaction of 3-(1-hydrazono ethyl)-phenol amine with salicyaldehyde under reflux in methanol, gave the ligand (HL).The prepared ligand was characterized by I.R, U.V-Vis,1H- 13C NMR spectra and melting point and reacted with some metal ions under reflux in methanol with (1:1) ratio gave complexes of the general formula: [MClL]. Where: M= Mn(II), Fe(II), Co(II),

... Show More
Preview PDF
Publication Date
Tue Dec 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of the push-out bond strength of root canal obturation materials filled by four different obturation techniques
...Show More Authors

Background: The aim of this study was to comparatively evaluate the push out bond strength (PBS) of root canal fillings using four different obturation techniques (single cone (SC), cold lateral compaction (CLC), continuous wave (CW), and carrier based gutta percha (CBG)). Materials and Methods: Forty mandibular premolar decoronated and instrumented with rotary ProTaper to F3 then teeth were divided randomly into 4 groups of 10 teeth for each as follow: group (I) single- cone obturation with matched-taper gutta-percha, group (II) cold lateral compaction technique, group (III) continuous wave of obturation technique, and group( IV) carrier based gutta-percha technique. Zinc oxide eugenol (ZOE) sealer was used as a root canal sealer for the

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 30 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of different acids surface treatments and thermocycling on shear bond strength of composite resin to feldspathic ceramic
...Show More Authors

Background: the aim of this study was to evaluate the effect of different surface acids treatments (37%phospjoric acid, 5%hydrofluoric acid, 1.23 acidulated phosphate fluoride) of feldspathic ceramic VITA 3D MASTER , and the effect of thermocycling on shear bond strength using a ceramic repair kit (ivoclar/vivadent). Material and Methods: sixty Nickel-Chromium metal base plates were prepared(9mm diameter,3mm depth) using lost wax technique, 2mm thick layer of ceramic(VITA 3D MASTER) fused to metal plates, all specimens were embedded in acrylic resin blocks except their examined surfaces and divided into 3 main groups 20 specimens each, Grp A: treatment with 37%phosphoric acid for 2 mins, Grp B: etching with 5% hydrofluoric acid for 2mins,

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2012
Journal Name
Advances In Physics Theories And Applications
Synthesis, Characterization, And Antibacterial Activities Of Manganese (II), Cobalt(II), Iron (II), Nickel (II) , zinc (II) And Cadmium(II) Mixed- Ligand Complexes Containing Amino Acid(L-Valine) And Saccharin
...Show More Authors

new six mixed ligand complexes of some transition metal ions Manganese (II), Cobalt(II), Iron (II), Nickel (II) , and non transition metal ion zinc (II) And Cadmium(II) with L-valine (Val H ) as a primary ligand and Saccharin (HSac) as a secondary ligands have been prepared. All the prepared complexes have been characterized by molar conductance, magnetic susceptibility infrared, electronic spectral, Elemental microanalysis (C.H.N) and AA . The complexes with the formulas [M(Val)2(HSac)2] M= Mn (II) , Fe (II) , Co(II) ,Ni(II), Cu (II),Zn(II) and Cd(II) L- Val H= (C5H11NO2) , C7H5NO3S The study shows that these complexes have octahedral geometry; The metal complexes have been screened for their in microbiological activities against bacteria.

... Show More
Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Compressive strength measurement for cement replacement with recycled glass in concrete
...Show More Authors

The most important environmental constraints at the present time
is the accumulation of glass waste (transparent glass bottles). A lot of
experiments and research have been made on waste and recycling
glass to get use it as much as possible. This research using recycling
of locally waste colorless glass to turn them into raw materials as
alternative of certain percentages of cement to save the environment
from glass waste and reduce some of the disadvantages of cement
with conserving the mechanical and physical properties of concrete
made. A set of required samples were prepared for mechanical test
with different weight percentage of waste glass (2%, 4%, 5%, 6%,
8%, 10%, 15%, 20% and 25%). American standard

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 08 2018
Journal Name
Proceedings Of The 2018 International Conference On Computing And Big Data
3D Parallel Coordinates for Multidimensional Data Cube Exploration
...Show More Authors

Visual analytics becomes an important approach for discovering patterns in big data. As visualization struggles from high dimensionality of data, issues like concept hierarchy on each dimension add more difficulty and make visualization a prohibitive task. Data cube offers multi-perspective aggregated views of large data sets and has important applications in business and many other areas. It has high dimensionality, concept hierarchy, vast number of cells, and comes with special exploration operations such as roll-up, drill-down, slicing and dicing. All these issues make data cubes very difficult to visually explore. Most existing approaches visualize a data cube in 2D space and require preprocessing steps. In this paper, we propose a visu

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Wasit Journal Of Computer And Mathematics Science
Dynamic Data Replication for Higher Availability and Security
...Show More Authors

The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref