In this article, performing and deriving te probability density function for Rayleigh distribution is done by using ordinary least squares estimator method and Rank set estimator method. Then creating interval for scale parameter of Rayleigh distribution. Anew method using is used for fuzzy scale parameter. After that creating the survival and hazard functions for two ranking functions are conducted to show which one is beast.
Equation Boizil used to Oatae approximate value of bladder pressure for 25 healthy people compared with Amqas the Alrotinahh ways used an indirect the catheter Bashaddam and found this method is cheap and harmless and easy
Image processing is an important source for the image
analytical in order to get variable parameters such as the
intensity .In present work it has been found a relation between the tensity and number of pixd in the image , and from this relation we have got in this paper the inten
... Show MoreThe main aim of this paper is to study how the different estimators of the two unknown parameters (shape and scale parameter) of a generalized exponential distribution behave for different sample sizes and for different parameter values. In particular,
. Maximum Likelihood, Percentile and Ordinary Least Square estimators had been implemented for different sample sizes (small, medium, and large) and assumed several contrasts initial values for the two parameters. Two indicators of performance Mean Square Error and Mean Percentile Error were used and the comparisons were carried out between different methods of estimation by using monte carlo simulation techniq
... Show MoreWireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
This study was planned to evaluate the renal function tests and liver function tests and it carried out in Al-Yarmouk hospital,Baghdad –Iraqin patients withtype 1 and type 2 diabetes mellitus by measuring(uric acid,urea and creatinine) ,Aspartate aminotransferase (AST) and Alanine aminotransferase (ALT). Seventy five individuals of Iraqi adults (male) were divided into three groups, 25 patients with type1 diabetes mellitus ,25 patients with type 2 diabetes mellitus and 25 normal individuals were taken as control group. The mean value of uric acid, urea and creatinine was higher significantly in patients thanin control group (P< 0.05),while the correlation(p< 0.01) between age ,creatinine in type 1 and between age and (Urea, Uric acid ,cr
... Show MoreBackground: Rheumatoid arthritis is a chronic inflammatory autoimmune disease characterized by joint inflammation, involvement of exocrine salivary and lacrimal glands may occur as extra-articular mani¬festations in this disease. This study aimed to provide evidence of altered in function and composition of salivary gland in patients with rheumatoid arthritis by determine salivary flow rate and some biochemical parameters(total protein, amylase, peroxidase) and to investigate the relationship between disease activity and changes in function and composition of salivary gland. Materials and Methods: Fifty five patients with RA (7 males and 48 females) were enrolled in this study with age range (20-69) years. The patients were separated int
... Show MoreBackground: Atherosclerosis is a diffuse disease process, being present in one vascular bed predicts its presence in the others. Ankle –Brachial Pressure Index (ABI) is a simple index related to the extent of atherosclerosis in coronary and noncoronary arterial beds, reflecting generalized atherosclerosis.
Objectives: the aim of this study is to evaluate the relation of ABI to left ventricular systolic function using echocardiography in patients with coronary artery disease (CAD).
Patients and Methods: Sixty seven patients (67) with CAD of either sex (70% males) with mean age 58± 6 years enrolled in this study, from December 2013 till May 2014; all were referred to the Iraqi Centre for Heart Disease (I.C.H.D.) for further evalua
The amount of information on the web is growing rapidly and number of web sites
becomes huge, so set of web applications used to help user and give him some information
about these sites, especially in e- business, news and sites introduce services.
Since Web site is built by comparatively free description, it is difficult to perform
absolute evaluation. So, rating of Web site is performed from various viewpoints.
In this paper we proposed method for ranking and rating using the web service and java
script to motivation remote server and return some public information to the site user and
other private information to owner.
The reliability of hybrid systems is important in modern technology, specifically in engineering and industrial fields; it is an indicator of the machine's efficiency and ability to operate without interruption for an extended period of time. It also allows for the evaluation of machines and equipment for planning and future development. This study looked at reliability of hybrid (parallel series) systems with asymmetric components using exponential and Pareto distributions. Several simulation experiments were performed to estimate the reliability function of these systems using the Maximum Likelihood method and the Standard Bayes method with a quadratic loss (QL) function and two priors: non-informative (Jeffery) and inform
... Show MoreUsing watermarking techniques and digital signatures can better solve the problems of digital images transmitted on the Internet like forgery, tampering, altering, etc. In this paper we proposed invisible fragile watermark and MD-5 based algorithm for digital image authenticating and tampers detecting in the Discrete Wavelet Transform DWT domain. The digital image is decomposed using 2-level DWT and the middle and high frequency sub-bands are used for watermark and digital signature embedding. The authentication data are embedded in number of the coefficients of these sub-bands according to the adaptive threshold based on the watermark length and the coefficients of each DWT level. These sub-bands are used because they a
... Show More