The Estimation Of The Reliability Function Depends On The Accuracy Of The Data Used To Estimate The Parameters Of The Probability distribution, and Because Some Data Suffer from a Skew in their Data to Estimate the Parameters and Calculate the Reliability Function in light of the Presence of Some Skew in the Data, there must be a Distribution that has flexibility in dealing with that Data. As in the data of Diyala Company for Electrical Industries, as it was observed that there was a positive twisting in the data collected from the Power and Machinery Department, which required distribution that deals with those data and searches for methods that accommodate this problem and lead to accurate estimates of the reliability function, The Research Aims to Use The Method Of Moment To Estimate The Reliability Function for Truncated skew-normal Distribution, As This Distribution Represents a Parameterized Distribution That is Characterized By flexibility in dealing with data that is Distributed Normally and Shows some Skewness. From the values defined in the sample space, this means that a cut (Truncated) will be made from the left side in the Skew Normal Distribution and a new Distribution is Derived from the original Skew Distribution that achieves the characteristics of the Skew normal distribution function. Also, real data representing the operating times of three machines until the failure occurred were collected from The Capacity Department of Diyala Company for Electrical Industries, where the results showed that the machines under study have a good reliability index and that the machines can be relied upon at a high rate if they continue to work under the same current working conditions.
The most important topics that constitute the aesthetic and substantive aspect of the theatrical performance represented by the spatial environment of the presentation and the proposed virtual place that contains the technical and artistic elements of the presentation and highlights the strength of influence on it. In light of the above, the researchers divided the topic into four chapters.
The first chapter contained (the methodological framework), which included the research problem with regard to the directing treatments between the directors in establishing or creating theatrical venue, the importance of the research and the aim of the research, and the limits of the research to conclude the chapter by defining the terms.
... Show MoreThe research aims at showing the media awareness for Students, especially for the students of the preparatory schools through their following the mass media in forming the cultural, educational and political database. It also aims at building a content and prospectives that make them a wide awake stratum that safeguard the society which has faced huge effects of terrorist actions.
Furthermore, it aims at knowing to what extent that students have been acquainted with the printed and electronic newspapers. Finally, it aims at knowing to what extent that they are content with the mass media in covering and
... Show MoreIn this paper Heun method has been used to find numerical solution for first order nonlinear functional differential equation. Moreover, this method has been modified in order to treat system of nonlinear functional differential equations .two numerical examples are given for conciliated the results of this method.
The research studies the main variables for the concept of sharing in knowledge in one of the most important control agencies in Iraq, which is (The Federal Board of Supreme Audit). Also, the quality of the controlling businesses by the Board in light of the major challenges that facing the fight against signs of cheating and administrative and financial corruption for offices submitted to controlled and auditing, with the increasing and intensification of these appearances. In order to enable the Board to cope with this situation, has to be thinking hard about how to achieve excellence, progress and development to face these situations, through the application of sharing in knowledge for the financial controller, and then achiev
... Show MoreAbstract
The research aimed to test the relationship between the size of investment allocations in the agricultural sector in Iraq and their determinants using the Ordinary Least Squares (OLS) method compared to the Error Correction Model (ECM) approach. The time series data for the period from 1990 to 2021 was utilized. The analysis showed that the estimates obtained using the ECM were more accurate and significant than those obtained using the OLS method. Johansen's test indicated the presence of a long-term equilibrium relationship between the size of investment allocations and their determinants. The results of th
... Show MoreThe Umm Al-Naaj Marsh was chosen in Maysan province, and it is one of the sections of Mar Al-Hawza, which is one of the most prominent Iraqi marshes in the south. The marshes are located between latitudes 30 35 and 32 45 latitudes and longitudes 13 46 and 48 00. The area of the study area is 76479.432142 hectares to evaluate soil quality and health index and their spatial distribution based on measuring physical, chemical, biological and fertility traits and calculating the total quality index for those characteristics. Using an auger drilling machine, we collected 50 randomly selected surface samples, evenly distributed across the study region, from Al-Aq 0.0–0.30 m, noting their precise locations along the way. Soil health and quality w
... Show MoreIn this paper, a method for data encryption was proposed using two secret keys, where the first one is a matrix of XOR's and NOT's gates (XN key), whereas the second key is a binary matrix (KEYB) key. XN and KEYB are (m*n) matrices where m is equal to n. Furthermore this paper proposed a strategy to generate secret keys (KEYBs) using the concept of the LFSR method (Linear Feedback Shift Registers) depending on a secret start point (third secret key s-key). The proposed method will be named as X.K.N. (X.K.N) is a type of symmetric encryption and it will deal with the data as a set of blocks in its preprocessing and then encrypt the binary data in a case of stream cipher.
Imam Ibn Abi Shaybah counted in his book classified twenty-five and a hundred recent and impact claimed that Abu Hanifa has violated the provisions required by apparent, and these conversations and effects including with regard to worship and transactions, including with regard to personal status, including with regard to borders and felonies, and collected by Sheikh Muhammad Zahid Al-Kothari in his book funny jokes in talking about the responses of Ibn Abu Shaybah on Abu Hanifa, and these issues we will study in our research.