In this research, the semiparametric Bayesian method is compared with the classical method to estimate reliability function of three systems : k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has been used simulation procedure for comparison and different sample sizes of size (14,30,60 and 100) using standard comparison Integral Mean Square Error (IMSE). For k-out of-n system, the results indicate that it is better to use Bayesian method for samples of size (30,60 and 100), and to use the classical method for samples of size (14), whereas for series system the best method to use is Bayesian method for samples of size (14,60 and 100) , and to use the classical method for sample of size (30). for parallel system, it is better to use Bayesian method for all sample sizes.
<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task
... Show MoreA field experiment was carried out at University of Baghdad, College of Agricultural Engineering Sciences during fall season of 2020 and spring season of 2021. This study was aimed evaluate the effect of the organic fertilizer and boron foliar on the yield of potatoes for processing. The factorial experiment (5*4) within RCBD and three replicates. The organic fertilizer as palm peat at four levels (0, 12, 24 and 36 ton. ha-1) in addition to the chemical fertilizer recommendation treatment. Boron at four Concentrations 0, 100, 150 and 200 mg. L-1 . The results revealed significant different among application of organic fertilizer at the level of 24 ton. ha-1 and the foliar application of boron at a concentration of 100 mg. L-1 in the
... Show MoreIn this work, one configuration was used to study the electrical discharge resulting from the dielectric barrier. This configuration consists of a sheet of epoxy/Al composite with dimensions of 75 mm in length, 25 mm in width, and 3 mm in thickness. This panel is located at the center of the electrodes, so that the distance between each of the electrodes and the plate is 2 mm and plasma is generated at these distances. The relationship between voltage and current with changing the frequency of the equipment as well as changing the area of exposure to the upper electrode or changing its length has been studied. The length of the top electrode varies at 0, 10, 20, 30, and 40 mm from the center of the electrodes producing exp
... Show MoreSocial media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are
... Show MoreIn this paper, we illustrate how to use the generalized homogeneous -shift operator in generalizing various well-known q-identities, such as Hiene's transformation, the q-Gauss sum, and Jackson's transfor- mation. For the polynomials , we provide another formula for the generating function, the Rogers formula, and the bilinear generating function of the Srivastava-Agarwal type. In addition, we also generalize the extension of both the Askey-Wilson integral and the Andrews-Askey integral.
Hydraulic fracturing is considered to be a vital cornerstone in decision making of unconventional reservoirs. With an increasing level of development of unconventional reservoirs, many questions have arisen regarding enhancing production performance of tight carbonate reservoirs, especially the evaluation of the potential for adapting multistage hydraulic fracturing technology in tight carbonate reservoirs to attain an economic revenue.
In this paper we present a feasibility study of multistage fractured horizontal well in typical tight carbonate reservoirs covering different values of permeability. We show that NPV is the suitable objective function for deciding on the optimum number
With the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo
The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show More