The three parameters distribution called modified weibull distribution (MWD) was introduced first by Sarhan and Zaindin (2009)[1]. In theis paper, we deal with interval estimation to estimate the parameters of modified weibull distribution based on singly type one censored data, using Maximum likelihood method and fisher information to obtain the estimates of the parameters for modified weibull distribution, after that applying this technique to asset of real data which taken for Leukemia disease in the hospital of central child teaching .
The detection and estimation of weathering conditions have become a very important daily necessity in our life. For this purpose, several satellites of low resolution imagery were launched by the weathering and environmental agencies. The important weather paremeters are temperuter, wind direction, velocity, clould and humidity, etc. The low resolution images often deal with large-scale phenomena and the interpretation and projection of the produced data requires continuous development of tools and criteria. In this paper, the low spatial resolution data generated by the moderate resolution imaging spectroradiometer (MODIS) were used to monitor the cloud density and direction above Iraq and i
... Show MoreRheumatoid arthritis is a chronic inflammatory autoimmune disease its etiology is unknown. The classical autoimmune diseases, have adaptive immune genetic associations with autoantibodies and major histocompatibility complex (MHC) class II such as rheumatoid arthritis (RA), diabetes mellitus type two (DM II). Serum of99 males suffering from RA without DMII as group (G1), 45 males suffering from RA with DM II as group (G2) and 40 healthy males as group (G3) were enrolled in this study to estimation of alkaline phosphates (ALP), C-reactive protein (CRP) and Pentraxin-3(PTX). Results showed a highly significant increase in PTX3 levels in G1 and G2 compared to G3 and a significant decrease in G1comparing to G2. Results also revealed a significa
... Show MorePermanent deformation, fatigue and thermal cracking are the three typical distresses of flexible pavement. Using hydrated lime (HL) into the conventional limestone mineral additive has been widely practiced, including in Europe, to improve the mechanical properties of hot mix asphalt (HMA) concrete and as the result the durability of the constructed pavement. Large number of experimental studies have been reported to find the optimum addition of HL for the improvement on HMA concrete mechanical properties, moisture susceptibility and fatigue resistance. Pavement in service is under complex thermomechanical stress-strain conditions due to coupled atmospheric and surrounding environment temperature variation and the traffic loading. To predic
... Show MoreIn this study, bauxite and modified bauxite /polymer, which were prepared as an adsorbent surfaces to adsorption of the tetracycline from aqueous solutions. A series of adsorption experiments were conducted to determine the equilibrium time and temperature effect on the adsorption process. The results showed that adsorption was agreed with the Freundlich equation model for the surface of the bauxite. As for the modified bauxite surface, the results were consistent with the Langmuir equation model. The values of the basic thermodynamic functions of the adsorption process were calculated, so the process of adsorption was founded spontaneous and endothermi
In this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes
The presented work shows a preliminary analytic method for estimation of load and pressure distributions on low speed wings with flow separation and wake rollup phenomena’s. A higher order vortex panel method is coupled with the numerical lifting line theory by means of iterative procedure including models of separation and wake rollup. The computer programs are written in FORTRAN which are stable and efficient.
The capability of the present method is investigated through a number of test cases with different types of wing sections (NACA 0012 and GA(W)-1) for different aspect ratios and angles of attack, the results include the lift and drag curves, lift and pressure distributions along the wing s
... Show MoreThe Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t
... Show MoreComputer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul
... Show MoreAs a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show More