The Estimation Of The Reliability Function Depends On The Accuracy Of The Data Used To Estimate The Parameters Of The Probability distribution, and Because Some Data Suffer from a Skew in their Data to Estimate the Parameters and Calculate the Reliability Function in light of the Presence of Some Skew in the Data, there must be a Distribution that has flexibility in dealing with that Data. As in the data of Diyala Company for Electrical Industries, as it was observed that there was a positive twisting in the data collected from the Power and Machinery Department, which required distribution that deals with those data and searches for methods that accommodate this problem and lead to accurate estimates of the reliability function, The Research Aims to Use The Method Of Moment To Estimate The Reliability Function for Truncated skew-normal Distribution, As This Distribution Represents a Parameterized Distribution That is Characterized By flexibility in dealing with data that is Distributed Normally and Shows some Skewness. From the values defined in the sample space, this means that a cut (Truncated) will be made from the left side in the Skew Normal Distribution and a new Distribution is Derived from the original Skew Distribution that achieves the characteristics of the Skew normal distribution function. Also, real data representing the operating times of three machines until the failure occurred were collected from The Capacity Department of Diyala Company for Electrical Industries, where the results showed that the machines under study have a good reliability index and that the machines can be relied upon at a high rate if they continue to work under the same current working conditions.
Abstract
The goal of the research is to diagnose some of the negative phenomena which was discovered through the period from (2010 to 2014) as determined by the national strategy to eliminate the corruption which was set out by the joint council of the corruption elimination in Iraq. And to measure the gap in applying the legal rules by the administration, concerning the misconducts and felonies upon the state employments made by the state employee and how far they are applied in the studied sample and to show the nature of the rules and their importance and their role when they are applied in scientific and expertise manner. And to encourage the offices of the general supervisors to adhere to them which will lead t
... Show MoreThis study aims to estimate the accuracy of digital elevation models (DEM) which are created with exploitation of open source Google Earth data and comparing with the widely available DEM datasets, Shuttle Radar Topography Mission (SRTM), version 3, and Advanced Spaceborne Thermal Emission and Reflection Radiometer Global Digital Elevation Model (ASTER GDEM), version 2. The GPS technique is used in this study to produce digital elevation raster with a high level of accuracy, as reference raster, compared to the DEM datasets. Baghdad University, Al Jadriya campus, is selected as a study area. Besides, 151 reference points were created within the study area to evaluate the results based on the values of RMS.Furthermore, th
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThe prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreThis paper calculated the Duration Magnitude (MD) equation using data from the Iraqi Meteorological Organization and seismology (IMOS). It is an empirically determined equation and expressed as:
The epicentral distance and local geological conditions affect the duration of the coda. The data is obtained from 7 seismic stations in the network. The new proposed duration magnitude equation results from applying linear regression analysis to the data of a seismic signal duration with correlation coefficient R2=0.76; and a standard deviation value of 0.049. Station corrections indicated by Sc are also specified for the seismic stations that range from -0.024 to + 0.02.
Back ground: The gender related difference
may be the result of pregandiol excretion in the
latter half of pregnancy.
Aim: This study is to evaluate the effects of fetal
gender on serum human chorionic gonadotropin
[HCG] and testosterone in normotensive and
preeclamptic pregnancies
Methods: The study consisted of fifty women with
singleton pergnancy in their third trimester. Twenty
five pregnancies were uncomplicated Among those
there were thirteen male, and twelve female fetuses
Twenty five pregnancies were complicated by
preeclampsia. Among those thirteen were with male,
and twelve were with female fetuses. Human
chorionic gonadotropin and total testosterone were
measured in maternal periphe
Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show MoreIn this research, we studied the multiple linear regression models for two variables in the presence of the autocorrelation problem for the error term observations and when the error is distributed with general logistic distribution. The auto regression model is involved in the studying and analyzing of the relationship between the variables, and through this relationship, the forecasting is completed with the variables as values. A simulation technique is used for comparison methods depending on the mean square error criteria in where the estimation methods that were used are (Generalized Least Squares, M Robust, and Laplace), and for different sizes of samples (20, 40, 60, 80, 100, 120). The M robust method is demonstrated the best metho
... Show MoreIn this research, we studied the multiple linear regression models for two variables in the presence of the autocorrelation problem for the error term observations and when the error is distributed with general logistic distribution. The auto regression model is involved in the studying and analyzing of the relationship between the variables, and through this relationship, the forecasting is completed with the variables as values. A simulation technique is used for comparison methods depending
The study involved the description of the environmental characters and distribution of Anogramma leptophylla (Annual Maidenhair fern) in Erbil and Garmian districts during May- 2017 in Kurdistan of Iraq. The geographical distribution of the taxa was recorded in Bani Bee region for the first time within the Garmian district but it was recorded before in the Zar Gali region within the Erbil district. The climatic characters of the studied site in Erbil district were: moist, cold and the elevation was up to 560 m above sea level with sandy clay soil texture whereas in the Garmian district: dry, hot, and the elevation was only 330 m above sea level with sandy stone soil. Plant up to 13 cm long, megaphyl
... Show More