This paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.
Background: Periodontitis is an inflammatory disease that affects the supporting tissues of the teeth; Smoking is an important risk factor for periodontitis induces alveolar bone loss and cause an imbalance between bone resorption and bone deposition. The purpose of this study is to detect and compare the presence of incipient periodontitis among young smokers and non-smokers by measuring the distance between cement-enamel junction and alveolar crest (CEJ-Ac) using Cone Beam Computed Tomography (CBCT). Material and methods: The total sample composed of fifty two participants, thirty one smokers and twenty one non-smokers (age range 14-22 years). Periodontal parameters: plaque index (PLI), gingival index (GI) were recorded for all teeth exc
... Show MoreSocial reform is the main pillar of the organization of societies. Therefore, all religions and theories were directed to focus on this aspect as the most important element for the development of economic and cultural development. In addition to the analysis and application of the Islamic Sharia, he did not present a theory, but offered real solutions and remedies to the crises in our Arab and Islamic societies alike, despite the criticism directed at him. Z his opinions.<
... Show MoreSocial reform is the main pillar of the organization of societies. Therefore, all religions and theories were directed to focus on this aspect as the most important element for the development of economic and cultural development. In addition to the analysis and application of the Islamic Sharia, he did not present a theory, but offered real solutions and remedies to the crises in our Arab and Islamic societies alike, despite the criticism directed at him. Z his opinions.
Liquid membrane electrodes for the determination iron(III) were constructed based on chloramphenicol sodium succinate and iron(III) CPSS-Fe(III) as ion pair complex, with four plasticizers Di-butyl phosphate (DBP); Di-butyl phthalate (DBPH); Di-octyl phthalate (DOP); Tri-butyl phosphate (TBP); in PVC matrix . These electrodes give Nernstian and sub-Nernstian slopes (19.79, 24.60, 16.01 and 13.82mV/decade) and linear ranges from (1x10-5-1x10-2 M, 1x10-5-1x10-2 M, 1x10-6-1x10-2 M and 1x10-5-1x10-2 M) respectively. The best electrode was based on DBP plasticizer which gave a slope 19.79 mV/decade, correlation coefficient 0.9999, detection limit of 9×10-6 M, lifetime 37 day displayed good stability and reproducibility and used to determine
... Show MoreNew biscarboxylato zwitterionic ligands, namely bis(N-carboxylatoethyl)-4,4 -dipyridinum) L1 and bis(Ncarboxylatopropyl)-)-4,4 -dipyridinum) L2, were synthesized from the reaction of 4,4 -dipyridine with 3-bromopropanoic acid and 4-bromobutanoic acid, respectively. The reaction of these ligands and the azido coligand with some metal ions resulted in the formation of polymeric complexes of general formulae [Cr2(Ln)(N3)4]Cl2·H2O and [M2(Ln)(N3)4] xH2O, where (M = Mn(II), Fe(II), Co(II), Ni(II), Cu(II), Zn(II) and Cd(II); n = 1, 2; x = 1, 1, 1, 1, 0, 1, and 1, respectively.) The oxygens of the carboxylato group are coordinated to the metal ion in a bidentate fashion. The mode of bonding and overall geometry of the complexes were determin
... Show MoreMedium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the
Background: Oral pyogenic granuloma (PG) is a clinicopathological entity that could develop due to the reaction to a variety of stimuli, such as low-grade local irritation, traumatic damage, and hormonal stimulation. There are two histopathological types of pyogenic granuloma; lobular type -capillary hemangioma (LCH) and non-lobular type; with PG,LCH has highly vascular, diffuse capillary growth while non- lobular variant mimicking granulation tissue with heavily inflammated stroma. The study aims were to review the clinical and histopathological spectrum of an oral pyogenic granuloma from different intraoral sites in order to avoid diagnostic pitfalls associated with similar morphological lesions and to determine
... Show MoreWaveform flow of non-Newtonian fluid through a porous medium of the non-symmetric sloping canal under the effect of rotation and magnetic force, which has applied by the inclined way, have studied analytically and computed numerically. Slip boundary conditions on velocity distribution and stream function are used. We have taken the influence of heat and mass transfer in the consideration in our study. We carried out the mathematical model by using the presumption of low Reynolds number and small wave number. The resulting equations of motion, which are representing by the velocity profile and stream function distribution, solved by using the method of a domain decomposition analysis a
Since the law is the tool for implementing the state’s public policies, it is natural that its provisions (or at least some of them) seek to preserve human dignity as the source on which all rights and freedoms are based. One of the examples of humanizing the provisions of the law in France is what is known as the winter truce. What is this truce, what are the justifications for granting it, what is its historical origin, how did the legislative treatment of it develop, what are the similarities and differences between it and other legal periods included in French law, what is the scope of its application, and what are the effects resulting from it. These questions and others are what we will try to answer through this research.
The peculiarity of worship spaces in the Islamic architecture is evident by its symbolic connotations with doctrinal connections, thus the niche has a major status in that symbolic connotation, which transformed due to the cultural interaction from a rock on the wall directed towards Mecca into an element of integrated structural entity with performative and aesthetic characteristics. The spread of the Islamic religion contributed to subjecting it to a design acculturation process, thus the problem of the research was raised by the following question: has the evolutionary tendency of acculturation been able to effect a major transformation in the niche design? The research aims at identifying the design acculturation and its translation
... Show More