Preferred Language
Articles
/
bsj-4154
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
Stimulation of Hatching Efficiency in Capsulated Cysts of Artemia fransiscana Using 890 nm Diode Laser
...Show More Authors

Artemia fransiscana is one of the most important live food for commercial larval aquaculture. The aim of this study is to investigate the effects of 890 nm diode laser irradiation on Artemia capsulated cysts using (1-10) minutes exposure time, and 2.26x10-3 J/cm2 Fluence. The Artemia samples were obtained from two locations: Dyalaa and Basraa. After irradiation, hatching percentage (H %) and hatching efficiency(HE) of Artemia were measured after 24 and 48 hours of incubation. The results of the effect of laser light on the capsulated cysts from Dyalaa showed that the optimum dose for enhancing (H %) after 24 hours of incubation is using 10 minutes exposure time, while after 48 hours of incubation the (H %) enhancement can be achieved

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Sust Journal Of Engineering And Computer Science (jecs)
Virtual failure influence of Roseires dam on Khartoum city using HEC-RAS Hydraulic simulation modeling
...Show More Authors

Dam break is series phenomenon that can result in fatal consequences and loss of properties. Unfortunately, the observed consequences can only be available after the dam breaks. Therefore, it is important to anticipate what will happen prior to dam break to issue suitable warning and locate the possible risk areas. This study attempts to simulate the case of dam break in Blue Nile at Roseires dam and see its consequences downstream. Roseires dam lies at a distance of 630 km south of Khartoum, Sennar dam lies at about 260 km downstream of Roseires dam. In this study hydraulic model is developed based of Hydraulic Engineering Centre (HEC), River Analysis System (RAS), and HEC- RAS. The HEC-RAS based model is calibrated and validated usi

... Show More
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Improvement of the surface hardness and wear resistant of low carbon steel using laser radiation
...Show More Authors

0

View Publication Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Research Journal Of Chemistry And Environment
Biodiesel from fresh and waste sunflower oil using calcium oxide catalyst synthesized from local limestone
...Show More Authors

Scopus (9)
Scopus
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Lead Ions from Wastewater by using a Local Adsorbent from Charring Tea Wastes
...Show More Authors

   Adsorption of lead ions from wastewater by native agricultural waste, precisely tea waste. After the activation and carbonization of tea waste, there was a substantial improvement in surface area and other physical characteristics which include density, bulk density, and porosity. FTIR analysis indicates that the functional groups in tea waste adsorbent are aromatic and carboxylic. It can be concluded that the tea waste could be a good sorbent for the removal of Lead ions from wastewater. Different dosages of the adsorbents were used in the batch studies. A random series of experiments indicated a removal degree efficiency of lead reaching (95 %) at 5 ppm optimum concentration, with adsorbents R2 =97.75% for tea. Three mo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
Environmental Earth Sciences
Urban geochemistry assessment using pollution indices: a case study of urban soil in Kirkuk, Iraq
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Iraqi Journal Of Science
Frame-Based Change Detection Using Histogram and Threshold to Separate Moving Objects from Dynamic Background
...Show More Authors

      Detecting and subtracting the Motion objects from backgrounds is one of the most important areas. The development of cameras and their widespread use in most areas of security, surveillance, and others made face this problem. The difficulty of this area is unstable in the classification of the pixels (foreground or background). This paper proposed a suggested background subtraction algorithm based on the histogram. The classification threshold is adaptively calculated according to many tests. The performance of the proposed algorithms was compared with state-of-the-art methods in complex dynamic scenes.

View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Anticorrosion Behavior of Deposited Magnetite on Galvanized Steel in Saline Water Using RF-Magnetron Sputtering
...Show More Authors

Thin films of Magnetite have been deposited on Galvanized Steel (G-S) alloy using RF-reactive magnetron sputtering technique and protection efficiency of the corrosion of G-S. A Three-Electrodes Cell was used in saline water (3.5 % NaCl) solution at different temperatures (298, 308, 318 & 328K) using potentiostatic techniques with. Electrochemical Impedance Spectroscopy (EIS) and fitting impedance data via Frequency Response Analysis (FRA) were applied to G-S alloy with Fe3O4 and tested in 3.5 % NaCl solution at 298K.Results taken from Nyquist and Bode plots were analyzed using software provided with the instrument. The results obtained show that the rate of corrosion of G.S alloy increased with increasing the temperatures from 298 t

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Jul 04 2025
Journal Name
Computational And Theoretical Chemistry
Coronene and BN isosters of coronene: Revealing the electron density distribution using magnetic shielding maps
...Show More Authors

View Publication
Scopus Clarivate Crossref