The two parameters of Exponential-Rayleigh distribution were estimated using the maximum likelihood estimation method (MLE) for progressively censoring data. To find estimated values for these two scale parameters using real data for COVID-19 which was taken from the Iraqi Ministry of Health and Environment, AL-Karkh General Hospital. Then the Chi-square test was utilized to determine if the sample (data) corresponded with the Exponential-Rayleigh distribution (ER). Employing the nonlinear membership function (s-function) to find fuzzy numbers for these parameters estimators. Then utilizing the ranking function transforms the fuzzy numbers into crisp numbers. Finally, using mean square error (MSE) to compare the outcomes of the survival function before and after fuzzy work. The period of study was (May, June, July, and August). The number of patients who entered the study during the above period was 1058 patients. Six cases have been ruled out including: The number of prisoners was 26. The number of people with negative swabs was 48. The number of patients who exit status was unknown was 29. The number of patients who escaped from the hospital was 2. The number of patients transferred to other hospitals was 35. The number of patients discharged at their responsibility was 133. Then the number of patients who entered the (study) hospital which is the sample size becomes (n=785). The number of patients who died during the period of study was (m=88). The number of patients who survived during the study period was (n-m=697).
In the present study, an attempt has been made to study the change in water quality of the river in terms of turbidity during lockdown associated with COVID-19. Iraq announced the longest-ever lockdown on 25 March 2020 due to COVID-19 pandemic.
In the absence of ground observations, remote sensing data was adopted, especially during this period. The change in the visible region's spectral reflectance of water in part of the river has been analyzed using the Landsat 8 OLI multispectral remote sensing data at Tigris River, Salah al-Din province (Bayji / near the refinery), Iraq. It was found that the green and red bands are most sensitive and can be used to estimate turbidity. Furthermore, the temporal variation in turbidity was a
... Show MoreA new distribution, the Epsilon Skew Gamma (ESΓ ) distribution, which was first introduced by Abdulah [1], is used on a near Gamma data. We first redefine the ESΓ distribution, its properties, and characteristics, and then we estimate its parameters using the maximum likelihood and moment estimators. We finally use these estimators to fit the data with the ESΓ distribution
The first known use of the term conspiracy theory dated back to the nineteenth century. It is defined as a theory that explains an event or set of circumstances as the result of a secret plot by usually powerful conspirators. It is commonly used, but by no means limited to, extreme political groups. Since the emergence of COVID-19 as a global pandemic in December 2019, the conspiracy theory was present at all stages of the pandemic.
The first known use of the term conspiracy theory dated back to the nineteenth century. It is defined as a theory that explains an event or set of circumstances as the result of a secret plot by usually powerful conspirators. It is commonly used, but by no means limited to, extreme political groups. Since the emergence of COVID-19 as a global pandemic in December 2019, the conspiracy theory was present at all stages of the pandemic.
The current study aims to compare between the assessments of the Rush model’s parameters to the missing and completed data in various ways of processing the missing data. To achieve the aim of the present study, the researcher followed the following steps: preparing Philip Carter test for the spatial capacity which consists of (20) items on a group of (250) sixth scientific stage students in the directorates of Baghdad Education at Al–Rusafa (1st, 2nd and 3rd) for the academic year (2018-2019). Then, the researcher relied on a single-parameter model to analyze the data. The researcher used Bilog-mg3 model to check the hypotheses, data and match them with the model. In addition
... Show More- S. Eliot is one of the important founders of the modernist movement in literature, a cutting-edge poet of the first order. After his 1927 conversion to Anglicanism, he began calling himself a conservative, royal, and a classicist.
"Ash Wednesday" is the first long poem written by him after his conversion. It deals with the struggle that ensues when one who has lacked faith acquires it. It is richly but ambiguously allusive, and deals with the aspiration to move from spiritual barrenness to hope for human salvation.
"Ash Wednesday" not only struggles with an approach to faith but with an approach to a language capable of expressing it. Eliot's style is different from that that predates his conve
This study discussed a biased estimator of the Negative Binomial Regression model known as (Liu Estimator), This estimate was used to reduce variance and overcome the problem Multicollinearity between explanatory variables, Some estimates were used such as Ridge Regression and Maximum Likelihood Estimators, This research aims at the theoretical comparisons between the new estimator (Liu Estimator) and the estimators
This article deals with estimations of system Reliability for one component, two and s-out-of-k stress-strength system models with non-identical component strengths which are subjected to a common stress, using Exponentiated Exponential distribution with common scale parameter. Based on simulation, comparison studies are made between the ML, PC and LS estimators of these system reliabilities when scale parameter is known.
In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show More