In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators.
In this work, an enhanced Photonic Crystal Fiber (PCF) based on Surface Plasmon Resonance (SPR) sensor using a sided polished structure for the detection of toxic ions Arsenic in water was designed and implemented. The SPR curve can be obtained by polishing the side of the PCF after coating the Au film on the side of the polished area, the SPR curve can be obtained. The proposed sensor has a clear SPR effect, according to the findings of the experiments. The estimated signal to Noise Ratio (SNR), sensitivity (S), resolution (R), and Figures of merit (FOM) are approaching; the SNR is 0.0125, S is 11.11 μm/RIU, the resolution is 1.8x〖10〗^(-4), and the FOM is 13.88 for Single-mode Fiber- Photonic Crystal Fiber- single mode Fiber (SMF-P
... Show MoreBackground: Strangles is a highly contagious equine respiratory disease caused by Streptococcus equi subsp. equi. It is a globally significant pathogen and one of the most common infectious agents in horses. In Iraq, no sequencing data on this pathogen are available, and only two molecular studies have been published to date. This study provides preliminary insights into strain diversity and provides a foundation for future large-scale investigations. Aim: This study aimed to investigate the molecular characteristics, identify SeM gene alleles, and perform a phylogenetic analysis of S. equi isolates from horses in Baghdad, Iraq. Methods: We analyzed 59 Streptococcus spp. isolates previously obtained from equine clinical sample
... Show MoreThe experiment was carried out in the green house of botanical garden belong to Department of Biology/College of Education for Pure Science- Ibn–al- Haitham/University of Baghdad, for the growth season 2015 using plastic pots. The experiment aimed to study the effect of two concentrations of sodium chloride (50, 100) mM.L-1 in addition to the control and four concentrations of kinetin (25, 50, 75, 100) mg.L-1 in addition to the control and the influence of application and non application of fertilizlizer NPKZn in the level 160 kg.h1- and their interactions on some growth parameters (fresh weight for both root and vegetative part, dry weight for leaves , value of secondary productivity, biomass duration for vegetative part and dry weight f
... Show MoreAbstract
The removal of water turbidity by using crumb rubber filter was investigated .The present study was conducted to evaluate the effect of variation of influent water turbidity (10, 25 and 50 NTU), media size (0.6and 1.14mm), filtration rate (25, 45 and 65 l/hr) and bed depth (30 and 60 cm) on the performance of mono crumb rubber filter in response to the effluent filtered water turbidity and head loss development, and compare it with that of conventional sand filter.Results revealed that 25 l/hr flow rate and 25 NTU influent turbidity were the best operating conditions. smaller media size and higher bed depth gave the best removal efficiency while higher media size and small bed depth gave lower head
... Show Moreتظهر الحاجة إلى الاستثمارات الرأسمالية من عدة مصادر كالحاجة إلى توسيع المنشآت الإنتاجية ، أو استجابة لحاجات المجتمع كشراء مكائن ومعدات لتخفيض تلوث الماء والهواء. أما أهم مصادر الحاجة لرؤوس الأموال فإنها تأتي من الموجودات الإنتاجية (باستثناء الأرض) ، حيث تستهلك هذه الموجودات (المكائن والآلات والعُدد) بشكل مستمر جراء الاستخدام ، فالمكائن، مثلا ، تسير دائما في طريقها نحو أكوام الخردة وال
... Show MoreThis paper deal with the estimation of the shape parameter (a) of Generalized Exponential (GE) distribution when the scale parameter (l) is known via preliminary test single stage shrinkage estimator (SSSE) when a prior knowledge (a0) a vailable about the shape parameter as initial value due past experiences as well as suitable region (R) for testing this prior knowledge.
The Expression for the Bias, Mean squared error [MSE] and Relative Efficiency [R.Eff(×)] for the proposed estimator are derived. Numerical results about beha
... Show MoreA stochastic process {Xk, k = 1, 2, ...} is a doubly geometric stochastic process if there exists the ratio (a > 0) and the positive function (h(k) > 0), so that {α 1 h-k }; k ak X k = 1, 2, ... is a generalization of a geometric stochastic process. This process is stochastically monotone and can be used to model a point process with multiple trends. In this paper, we use nonparametric methods to investigate statistical inference for doubly geometric stochastic processes. A graphical technique for determining whether a process is in agreement with a doubly geometric stochastic process is proposed. Further, we can estimate the parameters a, b, μ and σ2 of the doubly geometric stochastic process by using the least squares estimate for Xk a
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreIn the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show More