Preferred Language
Articles
/
jeasiq-1394
Notes on Exponential Distribution
...Show More Authors

المتغير العشوائي X  له توزيع أسي اذا كان له دالة احتمالية الكثافة بالشكل:

عندما  ، هذه هي الحالة الخاصة لتوزيع كاما.

غالباً جداً ولسبب معقول تأخذ . الحالة الخاصة لـ (1) التي نحصل عليها تسمى بالتوزيع الاسي لمعلمة واحدة.

اذا كانت  ، ، التوزيع في هذه الحالة يسمى التوزيع الاسي القياسي

اما بالنسبة لعائلة التوزيع الاسي.

افرض ان                                             

هي دالة لمعلمة واحدة لعائلة دوال احتمالية الكثافة الاسية بالنسبة الى قياس Lebesgue على مجموعات Borel لـ HCR مع معلمة الفضاء  التي تكتب بالشكل:

 

افرض ان  وان b هي قابلة للاشتقاق

الحالة  مع  هي اعتيادياً تعود الى الشكل القياسي ولاجل دالة احتمالية قياس لتوزيع اسي لشكل قياس c (.) ، d(.) وحيدة وتؤدي الى تحويلات

 انياً لاجل  وهكذا فاننا نفرض ان c(o) = o بدون فقدان التعميم.

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
PART 2 An Experiment on the Box plot
...Show More Authors

Abstract

These experiments seek to investigate the effects of the fixed variations to the basic box plot on subjects' judgments of the box lengths. The study consists of two experiments, were constructed as an extension to the experiments carried out previously by Hussin, M.M. (1989, 2006).  Subjects were asked to judge what percentage the shorter represented of the longer length in pairs of box lengths and give an estimate of percentage, one being a standard plot and the other being of a different box length and also varying with respect to other elements such as, box width or whisker length. When he (1989) suggested in the future research points (1, 2), the changing length of the st

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Mon Dec 30 2019
Journal Name
College Of Islamic Sciences
The effect of context on some Quranic methods
...Show More Authors

Each book has a specific style in which its author walks on it from its beginning to its end, and the Holy Qur’an is a book that compiled many methods that were indicative of its miracle, and that it is one unit even though it has been astrologer for twenty-three years.
There is no doubt that knowledge of the Qur’anic methods is one of the pillars of the approach that deals with any of the Qur’an, and the multiplicity of Qur’anic methods is a fact that has many causes. It has been expressed by the Qur’anic discharge and the conjugation of verses to bring them to different methods, and on multiple forms such as nominal, actual, singular Qur’an, presentation, delay, deletion, mention, abbreviation and redundancy. The Qur'ani

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The psychological and health implication on drugs’ users
...Show More Authors

The research aims to identify the meaning of drug addiction, which being one of the behavioral-deviation signs. It largely seems similar to alcohol-addiction. World health organization has defined drug addiction as a sporadic or chronic-state of intoxication emerges of recurrent-consumption of drugs that impact harmfully on individual and society. The second aim is to study the psychological and health implications on drugs’ users and thirdly to design a psychological-program for those who take drugs.     

View Publication Preview PDF
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 16 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The impact of information technology on tax evasion
...Show More Authors

The research aims at shedding light on the impact of information technology in reducing tax evasion in the General Authority for Taxation. In order to achieve this, the research relied on the analysis of its variables as a main tool for collecting data and information. The results showed that there is a positive and positive effect of information technology on tax evasion. The impact of information technology on increasing tax revenues and reducing the phenomenon of tax evasion In the performance of the research sample, the research sought to highlight the importance of tax information technology through its data and information to the tax administration for the purpose of completing the process Taxpayers for persons subject to income ta

... Show More
View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Journal Of Pharmaceutical, Chemical And Biological Sciences
Review on: Vaginitis. A problem to be solved!!
...Show More Authors

Candida is the scientific name for yeast. It is a fungus that lives almost everywhere, including in human body. Usually, the immune system keeps yeast under control. If the individual is sick or taking antibiotics, it can multiply and cause an infection. Yeast infections affect different parts of the body in different ways including thrush is a yeast infection that causes white patches in oral cavity ,Candida esophagitis is thrush that spreads to esophagus, women can get vaginal yeast infections,(vaginitis) causing itchiness, pain and discharge, yeast infections of the skin cause itching and rashes ,yeast infections in bloodstream can be life-threatening . The current review article will concentrate on vaginal infection (vaginitis), project

... Show More
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Fully Semiprime Submodules and Fully Semiprime Modules
...Show More Authors

   Let R be a commutative ring with unity and let M be a unitary R-module. In this paper we study fully semiprime submodules and fully semiprime modules, where a proper fully invariant R-submodule W of M is called fully semiprime in M if whenever XXW for all fully invariant R-submodule X of M, implies XW.         M is called fully semiprime if (0) is a fully semiprime submodule of M. We give basic properties of these concepts. Also we study the relationships between fully semiprime submodules (modules) and other related submodules (modules) respectively.

View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
On Generalized Φ- Recurrent of Kenmotsu Type Manifolds
...Show More Authors

          The present paper studies the generalized Φ-  recurrent of Kenmotsu type manifolds. This is done to determine the components of the covariant derivative of the Riemannian curvature tensor. Moreover, the conditions which make Kenmotsu type manifolds to be locally symmetric or generalized Φ- recurrent have been established. It is also concluded that the locally symmetric of Kenmotsu type manifolds are generalized recurrent under suitable condition and vice versa. Furthermore, the study establishes the relationship between the Einstein manifolds and locally symmetric of Kenmotsu type manifolds.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref