In this paper, a Monte Carlo Simulation technique is used to compare the performance of the standard Bayes estimators of the reliability function of the one parameter exponential distribution .Three types of loss functions are adopted, namely, squared error loss function (SELF) ,Precautionary error loss function (PELF) andlinear exponential error loss function(LINEX) with informative and non- informative prior .The criterion integrated mean square error (IMSE) is employed to assess the performance of such estimators
In this paper, some series of new complexes of Mn(II), Co(II), Ni (II) Cu(II) and Hg(II) are prepared from the Schiff bases (L1,L2). (L1) derived from 4-aminoantipyrine and O-phenylene dia mine then (L2) derived from (L1) and 2-benzoyl benzoic acid. Structural features are obtained from their elemental microanalyses, molar conductance, IR, UV–Vis, 1H, 13CNMR spectra and magnetic susceptibility. The magnetic susceptibility and UV–Vis, IR spectral data of the ligand (L1) complexes get square–planar and tetrahedral geometries and the complexes oflig and (L2) get an octahedral geometry. Antimicrobial examinations show good results in the sharing complexes.
Blastocystis is a ubiquitous human and animal protozoa that inhabit the gastrointestinal tract. Metronidazole is considered the standard drug for the treatment of Blastocystis infection; however, there is growing evidence of treatment failure, hazardous side effects, and appearance of strains resistant to metronidazole. In the last era, many studies have been implicated in the quest for new treatments for Blastocystis infection, especially natural products. Attention has been focused on the effect of Amygdalin (B17) and pumpkin seed on eradicating parasitic infections. The current work was built up to explore the in vitro efficacy of two natural compounds, Amygdalin (B17) and pumpkin seeds against
... Show MoreThe aim of this research is to study the effect of heat transfer on the oscillating flow of the hydrodynamics magnetizing Eyring-Powell fluid through a porous medium under the influence of temperature and concentration for two types of engineering conditions "Poiseuille flow and Couette flow". We used the perturbation method to obtain a clear formula for fluid motion. The results obtained are illustrated by graphs.
In this study, NAC-capped CdTe/CdS/ZnS core/double shell QDs were synthesized in an aqueous medium to investigate their utility in distinguishing normal DNA from mutated DNA extracted from biological samples. Following the interaction between the synthesized QDs with DNA extracted from leukemia cases (represents damaged DNA) and that of healthy donors (represents undamaged DNA), differential fluorescent emission maxima and intensities were observed. It was found that damaged DNA from leukemic cells DNA-QDs conjugates at 585 nm while intact DNA (from healthy subjects) DNA–QDs conjugates at 574 nm. The obtained results from the optical analyses indicate that the prepared QDs could be utilized as probe for detecting disrupted DNA th
... Show MoreChaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,
While using chaotic maps, in the suggested system, called
Emails have proliferated in our ever-increasing communication, collaboration and
information sharing. Unfortunately, one of the main abuses lacking complete benefits of
this service is email spam (or shortly spam). Spam can easily bewilder system because
of its availability and duplication, deceiving solicitations to obtain private information.
The research community has shown an increasing interest to set up, adapt, maintain and
tune several spam filtering techniques for dealing with emails and identifying spam and
exclude it automatically without the interference of the email user. The contribution of
this paper is twofold. Firstly, to present how spam filtering methodology can be
constructed based on the concep