The research studied and analyzed the hybrid parallel-series systems of asymmetrical components by applying different experiments of simulations used to estimate the reliability function of those systems through the use of the maximum likelihood method as well as the Bayes standard method via both symmetrical and asymmetrical loss functions following Rayleigh distribution and Informative Prior distribution. The simulation experiments included different sizes of samples and default parameters which were then compared with one another depending on Square Error averages. Following that was the application of Bayes standard method by the Entropy Loss function that proved successful throughout the experimental side in finding the reliability function for the soap manufacturing machines of the State Company for Vegetable Oils Industries whose behavior was based on the hybrid parallel-series system of a symmetrical component that followed both the exponential distribution and the Rayleigh distribution.
The topic of research (women and ideology in the feature film) is a series of researches addressed by the researcher on the subject of women in the feature film through studying the ideology as a thought and political system not only limited to the world of men, but women had a significant contribution in this area. The research identified the problem and its need as well as the objectives of the research and clarified its limits and importance. The research also identified the theoretical framework, which included the following axes: personality and ideology, film and ideology, then women and ideology in the film.
After the completion of the theoretical framework, the research concluded a set of indicators of the theoretic
... Show MoreA total 474 argasid ticks removed from 617 hosts including bats, rodents, and birds were found belong to four species of the genus Argos. One of which A. reflexus is reported for the first time for Iraq. Some informations regarding the infestation rate, intensity and some biological data are provided.
Necessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.
The goal of the research is to highlight the role of the governance and its characteristics in increasing the tax outcome by implementing the laws, regulations and annual controls issued annually from the general authority for taxation for the financing of the general treasury of the state, Additional development and economic capacity, As the search shares a view of the governance and its characteristics and its ideas from increasing tax output. The analytical transparent approach was used by adopting the practice of practicalities of the general authority for tax For quotations in the senior cabinet section ,the revealing of the ongoing operations was relied on the revenue for each financial year, The tools adopted in the process of ana
... Show MoreExcerption and inclusion are two terms in Arabic rhetoric. The excerption is defined as a taking a part of text from Holly Quran or Hadith and put it in a poem, verse line, or put it in a prose text. But the linguistics expand the concept of this term to include taking from another sciences and knowledge, like Grammar, Philology, and Prosody.
Inclusion is defined as taking a verse line or part of verse line from another poet to put it in a new poem, it is necessary that the poet who take the text should declare it, and if he hides it, it will be plagiarism.
This search is use these two terms in architecture, we have now new two terms in architecture, first one; architectural excerption, it means the designer takes a part of religio
Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThe study of the subject shows us the couflict between Somalian- Ethiopian. About Al-Oaghaden (1960-1978). This province is purely Somalian area in their language ،manners ،
traditions ،and their most population from Migrant bedouin.
In the last nineteenth century ،Ethiopia had entered to exit from plateau ،and become nearly from Red Sea and Indian Ocean.
The study shows us ،the conflict between colonization countries ،about African horn ،then fore Ethiopia entered as partner to divide the zone area ، and that division hadn’t Cares about the unity of people ،or the similar of language or religoun ،for this reason which had interference happened between broders and division about the same tribe from more Century ،
We can summarize the main risk factors for type 2 diabetes mellitus (T2DM) by looking at our nutrition, age, and lifestyle. β-cell dysfunction and insulin resistance (IR) are outcomes of the pathophysiology of type 2 diabetes. As an indirect result of IR on important metabolic enzymes, lipid and lipoprotein abnormalities are also a factor in T2DM patients. Recent research has indicated that lipid fluctuation may be the cause of poor glucose metabolism as well as one of its effects. Fatty acids (FAs) affect cell membrane fluidity and permeability, insulin receptor binding and signaling, and the translocation of glucose transporters. Therefore, it is suggested that FAs might play a crucial part in the emergence of IR and T2DM. The cu
... Show More