In this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method
The aim of this research is to investigation the optimization of the machining parameters (spindle speed, feed rate, depth of cut, diameter of cutter and number of flutes of cutter) of surface roughness for free-form surface of composite material (Aluminum 6061 reinforced boron carbide) by using HSS uncoated flat end mill cutters which are rare use of the free-form surface. Side milling (profile) is the method used in this study by CNC vertical milling machine. The purpose of using ANFIS to obtain the better prediction of surface roughness values and decreased of the error prediction value and get optimum machining parameters by using Taguchi method for the best surface roughness at spindle speed 4500 r.p.m, 920mm/rev feed rate, 0.6mm de
... Show MoreThere is an assumption implicit but fundamental theory behind the decline by the time series used in the estimate, namely that the time series has a sleep feature Stationary or the language of Engle Gernger chains are integrated level zero, which indicated by I (0). It is well known, for example, tables of t-statistic is designed primarily to deal with the results of the regression that uses static strings. This assumption has been previously treated as an axiom the mid-seventies, where researchers are conducting studies of applied without taking into account the properties of time series used prior to the assessment, was to accept the results of these tests Bmanueh and delivery capabilities based on the applicability of the theo
... Show MoreRecently, a new secure steganography algorithm has been proposed, namely, the secure Block Permutation Image Steganography (BPIS) algorithm. The new algorithm consists of five main steps, these are: convert the secret message to a binary sequence, divide the binary sequence into blocks, permute each block using a key-based randomly generated permutation, concatenate the permuted blocks forming a permuted binary sequence, and then utilize a plane-based Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image file format. The performance of algorithm was given a preliminary evaluation through estimating the PSNR (Peak Signal-to-Noise Ratio) of the stego image for limited number of experiments comprised hiding
... Show MoreA model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga
... Show MoreThe inelastic C2 form factors and the charge density distribution (CDD) for 58,60,62Ni and 64,66,68Zn nuclei has been investigated by employing the Skyrme-Hartree-Fock method with (Sk35-Skzs*) parametrization. The inelastic C2 form factor is calculated by using the shape of Tassie and Bohr-Mottelson models with appropriate proton and neutron effective charges to account for the core-polarization effects contribution. The comparison of the predicted theoretical values was conducted with the available measured data for C2 and CDD form factors and showed very good agreement.
Abstract:
This study seeks to shed light on the important processes are linked to the impact of accounting information on the behavior of producer and user of information and are urging informational and informational use. That accounting as a system of accounting information and functions of the delivery of information to decision makers Under behavioral entrance to the formulation of accounting theory should be taken into account Othertlk accounting information in the behavior of the decision maker which requires an explanation of human behavior and predictable.
On the other hand that the accounting information that should be delivered to the decision maker will affect your beha
... Show MoreThe goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.
This paper is interested in certain subclasses of univalent and bi-univalent functions concerning to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the second Hankel determinant have been investigated for the functions in our classes.
Basically, this study aims to identify the extent to which Iraqi secondary school students use writing strategies and how proficiency level and students gender could affect writing strategy use. The study also examines the relationship between writing achievement and writing strategy use among Iraqi secondary school students. For this purpose, 140 Iraqi secondary school students were selected randomly from six different schools. Petric and Czarl’s questionnaire (2003) was adopted in the study as an instrument to collect the needed data. A software of SPSS used to analyze the collected data. The findings revealed that secondary school students appeared as low users of writing strategies; low proficient students do not show a sta
... Show MoreThe aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.