The aim of this paper to find Bayes estimator under new loss function assemble between symmetric and asymmetric loss functions, namely, proposed entropy loss function, where this function that merge between entropy loss function and the squared Log error Loss function, which is quite asymmetric in nature. then comparison a the Bayes estimators of exponential distribution under the proposed function, whoever, loss functions ingredient for the proposed function the using a standard mean square error (MSE) and Bias quantity (Mbias), where the generation of the random data using the simulation for estimate exponential distribution parameters different sample sizes (n=10,50,100) and (N=1000), taking initial values for the parameters and initial value b, to get to estimator balanced add between two loss function ,moreover, the optimal sample size determination under proposed entropy loss function.
This paper considers and proposes new estimators that depend on the sample and on prior information in the case that they either are equally or are not equally important in the model. The prior information is described as linear stochastic restrictions. We study the properties and the performances of these estimators compared to other common estimators using the mean squared error as a criterion for the goodness of fit. A numerical example and a simulation study are proposed to explain the performance of the estimators.
The nuclear level density parameter in non Equi-Spacing Model (NON-ESM), Equi-Spacing Model (ESM) and the Backshifted Energy Dependent Fermi Gas model (BSEDFG) was determined for 106 nuclei; the results are tabulated and compared with the experimental works. It was found that there are no recognizable differences between our results and the experimental -values. The calculated level density parameters have been used in computing the state density as a function of the excitation energies for 58Fe and 246Cm nuclei. The results are in a good agreement with the experimental results from earlier published work.
Ferritin is a key organizer of protected deregulation, particularly below risky hyperferritinemia, by straight immune-suppressive and pro-inflammatory things. , We conclude that there is a significant association between levels of ferritin and the harshness of COVID-19. In this paper we introduce a semi- parametric method for prediction by making a combination between NN and regression models. So, two methodologies are adopted, Neural Network (NN) and regression model in design the model; the data were collected from مستشفى دار التمريض الخاص for period 11/7/2021- 23/7/2021, we have 100 person, With COVID 12 Female & 38 Male out of 50, while 26 Female & 24 Male non COVID out of 50. The input variables of the NN m
... Show MoreThe research includes the study and calculation of the modulation function of Optical Semiconductor Fractal Modulator and spatial frequency for different values of Silicon modulator transmittance percentage(10%,35%,45%,58%),it found the relation between the modulation function of Silicon and spatial frequency, the exponential relation of all values of the transmittance , the best state of modulation function when the value of transmittance is T=58% ,also the research includes the study of the relation of transmittance with different values of refractive index of Silicon . So the research involves building a computer program of output data which would relate to fractal optical modulation made of semiconductor mate
... Show MoreThis paper introduces a relationship between the independence of polynomials associated with the links of the network, and the Jacobian determinant of these polynomials. Also, it presents a way to simplify a given communication network through an algorithm that splits the network into subnets and reintegrates them into a network that is a general representation or model of the studied network. This model is also represented through a combination of polynomial equations and uses Groebner bases to reach a new simplified network equivalent to the given network, which may make studying the ability to solve the problem of network coding less expensive and much easier.
This work highlights the estimation of the Al-Khoser River water case that disposes of its waste directly into the Tigris River within Mosul city. Furthermore, the work studies the effects of environmental and climate change and the impact of pollution resulting from waste thrown into the Al-Khoser River over the years. Al-Khoser River is located in the Northern Mesopotamia of Mosul city. This study aims to detect the polluted water area and the polluted surrounding area. Temporal remote sensing data of different Landsat generations were considered in this work, specifically Enhanced Thematic Mapper Plus of 2000 and Operational Land Imager of 2015. The study aims to measure the amount of pollution in the study area over 15 years
... Show MoreIn this research, the TEC parameter has been determined for the ionosphere layer over the Iraqi zone. The calculations of this parameter have been conducted using the IRI model that considered as one of the recommended international models which used to calculate the ionosphere parameter (TEC). The determinations have been made for several sites or sites that located within the Iraqi territory. The years (2011-2013) of the solar cycle 24 have been adopted to make the determinations for the TEC parameter.The capital Baghdad has been selected to represent the transmitter station and many different communication points which are located in different directions around the transmitter station have been represented as receiving stations.
Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur
... Show More