In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators.
Although allowable amounts of glycol contamination in diesel engine oil, no research has been conducted on how these levels and varying loads affect engine performance. The research used a four-stroke diesel engine to investigate the effect of different glycol contamination levels (0, 120, and 220 ppm) under two engine loads (4.5 and 9 kW). Brake specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature were measured to determine the engine performance. The experiment used the factorial arrangement in a completely randomized design (CRD) with three replicates. Increasing the contamination levels from 0 to 120 and then to 220 ppm under constant engine load significantly increased brake specific fuel con
... Show MoreThis study includes applying chemical tests on cow, sheep and chicken bones including both hallow and flat. The results of chemical tests on bones mentioned the moisture percentage which was between 4.95-7.32 %, and it was noticed the difference in protein percentage among different kinds of bones, The highest protien percentage was 39.62 % in hallow chicken bones and the lowest was in hallow sheep bones 20.31%, at the same time, the highest Ash percentage was in hallow sheep bones48.11% , whereas the highest percentage of fat was in hallow cow bones 30%. The chemical and physical tests were conducted for extracted fat from hallow and flat bones for cows, sheeps and chicken. It was found that peroxide values (PV), and free fatty acids (F
... Show MoreIn this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes
The study aimed to prepare a nanocapsules formulation from the acetonic extract of Moringa oleifera leaves, using polymeric capsules, and test its toxicity against the third instar larvae of Culex pipiens mosquitoes. The leaf extract was prepared using acetone as a solvent, and the nano polymeric capsules were prepared using the synthetic polymer polyethylene glycol 4000. The results showed the successful preparation of nano polymeric capsules from the leaf extract, with an average particle size of 259.2 nm, and a nanocapsule diameter of 263.83 nm, as determined by DLS and SEM analysis, respectively. The toxicity results indicated that the nano polymeric capsules of the leaf extract exhibited higher mortality rates, reaching 97.6% a
... Show MoreAt the last years, the interesting of measurement spicilists was increased to study differential item functioning (DIF) wich is reflect the difference of propability true response for test item from subgroups which have equal level of ability . The aims of this research are, inform the DIFat Namers’scale(2009) for mental health to prepare students and detect items that have DIF. Sample research contants (540) students, we use Mantel- Haenzel chi-square to detect DIF. The results are point to there are (26) items have DIF according to gender which are delated form the scale after that.
The Boltzmann transport equation is solved by using two- terms approximation for pure gases and mixtures. This method of solution is used to calculate the electron energy distribution function and electric transport parameters were evaluated in the range of E/N varying from . 172152110./510.VcmENVcm
The electron energy distribution function of CF4 gas is nearly Maxwellian at (1,2)Td, and when E/N increase the distribution function is non Maxwellian. Also, the mixtures are have different energy values depending on transport energy between electron and molecule through the collisions. Behavior of electrons transport parameters is nearly from the experimental results in references. The drift velocity of electron in carbon tetraflouride i
Cesarean section, which was introduced into clinical practice as a lifesaving procedure for both the mother and the baby, is one of the most common surgeries performed in modern obstetrics. Formerly it was performed in interest of the mother; currently it is frequently done for fetal indication. As other procedures of some complexity, its use follows the health care inequity pattern of the world; underuse in low income setting, and adequate or even unnecessary use in middle and high income setting (1).
The first modern cesarean section was performed by German gynecologist Ferdinand Adolf Kehrer in 1881. Cesarean section is often performed when a vaginal delivery would put the baby's or mother's life or health at risk. Many are also pe
Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete
... Show MoreBig data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such a
... Show More