This paper deals with defining Burr-XII, and how to obtain its p.d.f., and CDF, since this distribution is one of failure distribution which is compound distribution from two failure models which are Gamma model and weibull model. Some equipment may have many important parts and the probability distributions representing which may be of different types, so found that Burr by its different compound formulas is the best model to be studied, and estimated its parameter to compute the mean time to failure rate. Here Burr-XII rather than other models is consider because it is used to model a wide variety of phenomena including crop prices, household income, option market price distributions, risk and travel time. It has two shape-parameters (α, r) and one scale parameter (λ) which is considered known. So, this paper defines the p.d.f. and CDF and derives its Moments formula about origin, and also derive the Moments estimators of two shapes parameters (α, r) in addition to maximum likelihood estimators as well as percentile estimators, the scale parameter (λ) is not estimated (as it is considered known). The comparison between three methods is done through simulation procedure taking different sample size (n=30, 60, 90) and different sets of initial values for (α, r, λ).It is observed that the moment estimators are the best estimator with percentage (46%) ,(42%) respectively compared with other estimators.
ترك السلطان عبدالحميد الثاني بصماتهُ على أخاديد الزمان وعلى خارطة المشرق العربي الخاضع للسيطرة العثمانية أنذاك ، لكونهُ أهم شخصية أسلامية غير عربية واجهت الخطر الصهيوني ومحاولاتهم الإستيطانية في مشرق الوطن العربي ، على الرغم من صعوبة الظروف التي كانت تمر بها الدولة العثمانية داخليا ً وخارجيا ً، بما فيها من أطماع اقتسامها بين الاوربين ولذا سموها بالرجل المريض .
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreThe members of the family of Eentrobacteriaceae harbour a gene cluster called polyketide synthase (pks) island. This cluster is responsible for the synthesis of the genotoxin colibactin that might have an important role in the induction of double-strand DNA breaks, leading to promote human colorectal cancer (CRC). Eleven out of the eighty eight isolates (12.5%) were pks+, distributed as 7 (8%) isolates of E. coli, 2 (2.25%) of K. pneumoniae and 2 (2.25%) of E. aerogenes. The cytotoxic effects of selected pks+ isolates (E. coli and E. aerogenes) on HeLa cells were represented by decreasing cell numbers and enlarged cell nuclei in comparison to the untreated cells. Cyt
... Show MoreNosocomial infection is acquired contamination of hospitals and health care units caused by multidrug resistant bacteria. Currently, bacterial resistance to antimicrobial medication represents a complicated public health problem. Recent studies on the antimicrobial activity of silver nanoparticles (AgNPs) attracted researchers worldwide to focus on the safe synthesis of AgNPs as antimicrobial agents against multidrug resistant bacteria. The antimicrobial efficacy of AgNPs on pathogenic bacteria isolated from clinical cases of acquired hospital infection was targeted in this project. Fifty specimens of stool were collected through private laboratories in Baghdad from patients who suffered diarrheal symptoms. Bacterial isolation, identific
... Show MoreThis research is marked by " lighting and processors formalism for spaces of shops selling mobile phones ," aims to " reveal about the relationship between lighting treatments formal designs spaces own internal selling mobile phone in addition to the recognition criteria Altsamama to lighting techniques and processes formality spaces shops competent to sell mobile phone " and lies the importance of this research in the " active role of the lighting in the building processors formalities and processes to prepare designs and show the final form integrated functionally and aesthetically so as to be ready for implementation , taking into consideration the role expressionist in the recipient and to make these spaces more than meet the require
... Show MoreThe atmospheric air cold plasma has been used to manufacture gold nanomaterials for treating parasitic leishmaniasis. This study experimentally assessed the treatment of Leishmania parasites (L. donovani and L. tropica) by gold nanoparticles. Specifically, atmospheric pressure nonthermal plasma was generated using different diameters (1.0, 2.8, 3.8 and 4.3 mm) of high voltage electrode. Aqueous gold tetrachloride salts (HAuCl4·4H2O) were used as precursor to produce gold nanoparticles. UV-vis spectroscopy and x-ray diffraction were conducted for characterization of the nanoparticles. The optimum condition (a diameter of 1 mm) was chosen to prepare gold nanoparticles, where the grain size was found to be 17 nm. Accordingly, the nanoparticle
... Show MoreThe measurement of vitamin B1 in pure and pharmaceutical formulations was proposed by using a straightforward and sensitive spectrophotometric approach. Sulfacetamide (SFA) is diazotized, then coupled with vitamin B1 in alkaline media to produce a colored azo dye complex with a stability constant of 5.597 × 105 L/mol. The product is stable, with a maximum absorption wavelength of 489.5 nm, molar absorptivity of 10108 L/mol∙cm, Sandell's sensitivity of 0.0334 μg/cm2, detection limit of 0.0135 μg/mL, and Beer's law being observed over the concentration range of 0.2–20.0 μg/mL. The stability constant and stoichiometry of the produced azo dye were calculated using the continuous variation (Job's) and mole ratio methods. The suggested ap
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show MoreThis research aims to develop new spectrophotometric analytical method to determine drug compound Salbutamol by reaction it with ferric chloride in presence potassium ferricyanide in acid median to formation of Prussian blue complex to determine it by uv-vis spectrophotmetric at wavelengths rang(700-750)nm . Study the optimal experimental condition for determination drug and found the follows: 1- Volume of(10M) H2SO4 to determine of drug is 1.5 ml . 2- Volume and concentration of K3Fe(CN)6 is 1.5 ml ,0.2% . 3- Volume and concentration of FeCl3 is 2.5ml , 0.2%. 4- Temperature has been found 80 . 5- Reaction time is 15 minute . 6- Order of addition is (drug + K3Fe(CN)6+ FeCl3 + acid) . Concentration rang (0.025-5 ppm) , limit detecti
... Show More