In this paper, suggested method as well as the conventional methods (probability
plot-(p.p.) for estimations of the two-parameters (shape and scale) of the Weibull
distribution had proposed and the estimators had been implemented for different
sample sizes small, medium, and large of size 20, 50, and 100 respectively by
simulation technique. The comparisons were carried out between different methods
and sample sizes. It was observed from the results that suggested method which
were performed for the first time (as far as we know), by using MSE indicator, the
comparisons between the studied and suggested methods can be summarized
through extremely asymptotic for indicator (MSE) results by generating random
errors with W(1, 1) and with generating with N(0,
2 ) at the first contrast (1,
1).The suggested method was reported better performance through the sequentially
status of ascending ordered for assumed initial contrast parameters, specially with
generating of random error with W (1, 1) cooperation with generating of N (0,δ) in
the simple linear regression equation.
This paper offers a critical examination of Canadian news guidelines and policies
on user-generated content (UGC) posted on news-related comment sections and
social media.
The outline of how news-related UGC is moderated within Canadian news is achieved
by looking at the online comment policies of major Canadian news organizations like .
the CBC, CityNews (Halifax), CTV News, Glacier Media, Global News, The Globe
and Mail, Narcity Media, Postmedia, QUB (Québecor), and Torstar.The policies highlight how Canadian news organizations have practical strategies
to manage news-related UGC but also call upon positive and negative social
principles, to flag ill practices, foster democracy, and fight against online hate sp
The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.
Throughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
The concept of the Extend Nearly Pseudo Quasi-2-Absorbing submodules was recently introduced by Omar A. Abdullah and Haibat K. Mohammadali in 2022, where he studies this concept and it is relationship to previous generalizationsm especially 2-Absorbing submodule and Quasi-2-Absorbing submodule, in addition to studying the most important Propositions, charactarizations and Examples. Now in this research, which is considered a continuation of the definition that was presented earlier, which is the Extend Nearly Pseudo Quasi-2-Absorbing submodules, we have completed the study of this concept in multiplication modules. And the relationship between the Extend Nearly Pseudo Quasi-2-Absorbing submodule and Extend Nearly Pseudo Quasi-2-Abs
... Show MoreThroughout this paper R represents commutative ring with identity and M is a unitary left R-module. The purpose of this paper is to investigate some new results (up to our knowledge) on the concept of weak essential submodules which introduced by Muna A. Ahmed, where a submodule N of an R-module M is called weak essential, if N ? P ? (0) for each nonzero semiprime submodule P of M. In this paper we rewrite this definition in another formula. Some new definitions are introduced and various properties of weak essential submodules are considered.
The research is a vision of the future of industry in Iraq, so it is may be outside the ceiling of the capabilities of the Iraqi economy, and therefore it is exaggerated. Therefore, future plans must be applicable through the availability of capabilities. Everyone knows that the financial and administrative corruption and mismanagement of resources are the main cause of the inefficiency of the industrial sector, and the failure to exercise its real role in achieving economic development.; as well as the political situation and the dominance of parties and their insistence on addressing positions that have a strong relationship in managing the economic sector that has a significant impact on drawing the economic map in its current
... Show MoreMultiple applications use offline handwritten signatures for human verification. This fact increases the need for building a computerized system for signature recognition and verification schemes to ensure the highest possible level of security from counterfeit signatures. This research is devoted to developing a system for offline signature verification based on a combination of local ridge features and other features obtained from applying two-level Haar wavelet transform. The proposed system involves many preprocessing steps that include a group of image processing techniques (including: many enhancement techniques, region of interest allocation, converting to a binary image, and Thinning). In feature extraction and
... Show Moreيتكون الانحدار المقسم من عدة أقسام تفصل بينها نقاط انتماء مختلفة، فتظهر حالة عدم التجانس الناشئة من عملية فصل الأقسام ضمن عينة البحث. ويهتم هذا البحث في تقدير موقع نقطة التغيير بين الأقسام وتقدير معلمات الأنموذج، واقتراح طريقة تقدير حصينة ومقارنتها مع بعض الطرائق المستعملة في الانحدار الخطي المقسم. وقد تم استعمال أحد الطرائق التقليدية (طريقة Muggeo) لإيجاد مقدرات الإمكان الأعظم بالأسلوب الت
... Show MoreThis paper aims at providing the teaching staff members with the necessary skills so as to become capable of tackling various situations, and treating daily problems that face students learning Spanish as a Second Language. This is made as an attempt to make teachers of foreign languages in general acquainted with modern trends of teaching with less complicated methods, specifically in teaching e earlier stages of foreign languages.
Abstracto:
En el presente trabajo pretendemos dotar al docente no nativo de Lenguas extranjeras, con algunos de los métodos necesari
... Show MoreThe research aimed to prepare muscle elongation exercises for the arms with high intensity in which the training methods for young blind fencers vary, and to identify the effect of the diversity of muscle elongation exercises for the arms with high intensity on the cellular basal efficiency (lactic acid and sodium bicarbonate) and pulmonary respiration for young blind weapon fencers in terms of sports technology, and the experimental approach was adopted by designing the experimental and equal control groups, and the limits of the research community were represented by young fencers with shish weapon under the age of (20) years in the Army Sports Club, whose number is Total (15) swordsmen, continuing their training for the sports season (20
... Show More