Preferred Language
Articles
/
jeasiq-2144
Some Estimation for the Parameters and Hazard Function of Kummer Beta Generalized Normal Distribution
...Show More Authors

Transforming the common normal distribution through the generated Kummer Beta model to the Kummer Beta Generalized Normal Distribution (KBGND) had been achieved. Then, estimating the distribution parameters and hazard function using the MLE method, and improving these estimations by employing the genetic algorithm. Simulation is used by assuming a number of models and different sample sizes. The main finding was that the common maximum likelihood (MLE) method is the best in estimating the parameters of the Kummer Beta Generalized Normal Distribution (KBGND) compared to the common maximum likelihood according to Mean Squares Error (MSE) and Mean squares Error Integral (IMSE) criteria in estimating the hazard function. While the practical side showed that the hazard function is increasing, i.e. the increment in staying the teachers in the service, they will be exposed to a greater failure rate as a result of the staying period which decreases in its turn.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
2021 International Conference On Computing And Communications Applications And Technologies (i3cat)
Parallel Hybrid String Matching Algorithm Using CUDA API Function
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The servant leadership and its impact in organizational trust An analytical study in oil products distribution company / Baghdad
...Show More Authors

Abstract

The research aims at the relationship between Servant leadership dimensions test as an independent variable and an organizational trust as a variable dependent. Thus it was necessary to answer the following question: Is there a correlation relationship and impact between Servant leadership dimensions and organizational trust? To investigate the contents of the answer, the researcher selected a group of employees in Oil Products Distribution Company / Baghdad. The researcher adopted the analytical descriptive approach in completing his research which dealt with a random sample of (190) individuals representing the research society out of the total number of (376) person from the middle and high Leaders. Depending

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Annals Of Biology
The Comparative Effect of Copper Oxide Nanoparticles and Copper Sulfate on Reproductive Hormones and Sperm Parameters in Mature Male Albino Mice
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Using spatial analysis techniques to Preparing maps for distribution of pollutant concentrations in Shatt al-Arab waters in November 2015
...Show More Authors
Abstract<p>Water has a great self-generating capacity that can neutralize the polluting interventions carried out by humans. However, if human activities continue this uncontrolled and unsustainable exploitation of this resource, this regenerating capacity shall fail and it will be jeopardized definitively. Shatt Al-Arab River in South of Iraq. It has an active role in providing water for irrigation, industry, domestic use and a commercial gateway to Iraq. in the last five years Shatt Al-Arab suffered from a rise in pollutants due to the severe decline in sewage networks, irregular networks and pesticide products, as well as the outputs of factories and companies that find their way to water sou</p> ... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Using spatial analysis techniques to Preparing maps for distribution of pollutant concentrations in Shatt al-Arab waters in November 2015
...Show More Authors

Water has a great self-generating capacity that can neutralize the polluting interventions carried out by humans. However, if human activities continue this uncontrolled and unsustainable exploitation of this resource, this regenerating capacity shall fail and it will be jeopardized definitively. Shatt Al-Arab River in South of Iraq. It has an active role in providing water for irrigation, industry, domestic use and a commercial gateway to Iraq. in the last five years Shatt Al-Arab suffered from a rise in pollutants due to the severe decline in sewage networks, irregular networks and pesticide products, as well as the outputs of factories and companies that find their way to water sources and lead to a widespread collapse of water quality.

... Show More
Scopus (4)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Equivalence of Some Iterations for Class of Quasi Contractive Mappings
...Show More Authors
Abstract<p>In this article, we recalled different types of iterations as Mann, Ishikawa, Noor, CR-iteration and, Modified SP_iteration of quasi δ-contraction mappings, and we proved that all these iterations equivalent to approximate fixed points of δ-contraction mappings in Banach spaces.</p>
View Publication
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Sat May 24 2025
Journal Name
Journal Of Genetic And Environment Conservation
Morphometric parameters analysis of white and brown Domyati ducks (Local Mallard in Egypt)
...Show More Authors

Morphometric traits or body conformation traits also called linear body measurements are important in predicting marketing body weight especially for commercial breeders and producers. The total number of reared Domyati ducklings are 168 hatched, at marketing age (8 wks.) 44 brown and 14 white Domyati ducks were used to estimate the body weight and body measurements such as shank length (ShL), keel length (KL), body circumference (BC), breast length (BrL), breast width (BrW), beak width (BL), and body length (BL). Our results showed that there is no significant difference between both white and brown Domyati ducks for body measurements. There was high positive correlation among body weight and body measurements on both white and bro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Journal Of Educational And Psychological Researches
اثر أنموذج ثيلين في اكتساب المفاهيم التاريخية لطالبات الصف الثاني معهد المعلمات / المركزي في مادة التاريخ
...Show More Authors

Chapter One – introduction

Nations managed today to achieve progress in the field of modern technology. Science has changed many beliefs and trendiness that people have held for long time, skills and scientific thinking developed, and made scientific observation  and experiment replace narration and taking from others. That is attributed to examining  the educational systems searching for the locations of defect, and shortage.

In the light of educational modernizations, many models of teaching incliuding a model for social tracing attributed to Herbart Thelen, which is a model to develop skills of social participation in the democratic process (Al-Khawalda,1993,335).

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.