In this paper, an estimate has been made for parameters and the reliability function for Transmuted power function (TPF) distribution through using some estimation methods as proposed new technique for white, percentile, least square, weighted least square and modification moment methods. A simulation was used to generate random data that follow the (TPF) distribution on three experiments (E1 , E2 , E3) of the real values of the parameters, and with sample size (n=10,25,50 and 100) and iteration samples (N=1000), and taking reliability times (0< t < 0) . Comparisons have been made between the obtained results from the estimators using mean square error (MSE). The results showed the percentile estimator is the best in (E1, E2) but modification moment is the best in (E3) .
Calcium-Montmorillonite (bentonite) [Ca-MMT] has been prepared via cation exchange reaction using benzalkonium chloride [quaternary ammonium] as a surfactant to produce organoclay which is used to prepare polymer composites. Functionalization of this filler surface is very important factor for achieving good interaction between filler and polymer matrix. Basal spacing and functional groups identification of this organoclay were characterized using X-Ray Diffraction (XRD) and Fourier Transform Infrared (FTIR) spectroscopy respectively. The (XRD) results showed that the basal spacing of the treated clay (organoclay) with the benzalkonium chloride increased to 15.17213 0A, this represents an increment of about 77.9% in the
... Show MoreThis new azo dye 3-((2-(1H-indol-3-yl) ethyl) diazenyl) quinoline-2-ol was subsequently used to prepare a series of complexes with the metal ions of Cr+3, Cu+2, VO+2, Mn+2and Mo+6. The compounds identified by 1H and 13C-NMR, FT-IR, UV-Vis, mass spectroscopy, as well as TGA, DSC, and C.H.N., conductivity, magnetic susceptibility, metal and chlorine content. The results showed that the ligand behaves in a bidantate, and that the complexes gave octahedral, excepting for VO+2 square pyramid was given, that all complexes are non-electrolytes. The effectiveness of mention the compounds in inhibiting free radicals was evaluated by the ability to act as an antioxidant was measured using DPPH as a free radical and gallic acid as a standard s
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreCybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a
... Show MoreThe research work was conducted to investigate the effect of oral administration of aqueous extract of turmeric at doses of (5, 10) mg/kg body weight for two weeks daily by determining the genotoxic effect (mitotic index), evaluation of immunological effect (IgG, IgM, IgA, C3, C4) and measuring fertility hormones (follicles stimulation hormone/FSH, lutenising hormone/LH) levels with histological examinations of female albino swiss mice ovaries in comparison with control (normal saline). A clear effect in increasing mitotic activity was reveled for both doses in comparison with control. Results also showed a significant increase in the value of all immunological parameters at both doses, in comparison with control. Also, obvious rais
... Show MoreThe research work was conducted to investigate the effect of oral administration of aqueous extract of turmeric at doses of (5, 10) mg/kg body weight for two weeks daily by determining the genotoxic effect (mitotic index), evaluation of immunological effect (IgG, IgM, IgA, C3, C4) and measuring fertility hormones (follicles stimulation hormone/FSH, lutenising hormone/LH) levels with histological examinations of female albino swiss mice ovaries in comparison with control (normal saline). A clear effect in increasing mitotic activity was reveled for both doses in comparison with control. Results also showed a significant increase in the value of all immunological parameters at both doses, in comparison with control. Also, obvious raise was se
... Show MoreArtificial Intelligence Algorithms have been used in recent years in many scientific fields. We suggest employing artificial TABU algorithm to find the best estimate of the semi-parametric regression function with measurement errors in the explanatory variables and the dependent variable, where measurement errors appear frequently in fields such as sport, chemistry, biological sciences, medicine, and epidemiological studies, rather than an exact measurement.
WA Shukur, journal of the college of basic education, 2011 The aim of this research is designing and implementing proposed steganographic method. The proposed steganographic method don’t use a specific type of digital media as a cover but it can use all types of digital media such as audio, all types of images, video and all types of files as a cover with the same of security, accuracy and quality of original data, considering that the size of embedded data must be smaller than the size of a cover. The proposed steganographic method hides embedded data at digital media without any changing and affecting the quality of the cover data. This means, the difference rate between cover before hiding operation and stego is zero. The proposed steg
... Show MoreAbstract
This paper represents a study of the effect of the soil type, the drilling parameters and the drilling tool properties on the dynamic vibrational behavior of the drilling rig and its assessment in the drilling system. So first, an experimental drilling rig was designed and constructed to embrace the numerical work.
The experimental work included implementation of the drill-string in different types of soil with different properties according to the difference in the grains size, at different rotational speeds (RPM), and different weights on bit (WOB) (Thrust force), in a way that allows establishing the charts that correlate the vibration acceleration, the rate of penetration (ROP), and the power
... Show More