In this paper, we used the maximum likelihood estimation method to find the estimation values ​​for survival and hazard rate functions of the Exponential Rayleigh distribution based on a sample of the real data for lung cancer and stomach cancer obtained from the Iraqi Ministry of Health and Environment, Department of Medical City, Tumor Teaching Hospital, depending on patients' diagnosis records and number of days the patient remains in the hospital until his death.
The health care provided by health institutions and all kinds suffers from many problems, and since the health services provided are related to human life, it is necessary to shed light on this activity and identify the causes of these problems. This research aims to Definition of health institutions (hospitals) Performance audit of these institutions according to the latest indicators, which are the standards of health accreditation for hospitals, specifically the basic standards issued by the Health Care Accreditation Council (HCAC) to reach the level of performance and Knowledge of Constraints that lead to in an acceptable manner consistent with the approved standards. In theoretical and practical study, a number of conclusions were r
... Show MoreThe study has tackled three important variables on the strategic and organizational level, that are : (Administrative skill, strategic Entrepreneurship and organizational flexibility). Through the statistical analysis is, the research hers have sought to identify the relation among them. The study has been applied on a sample of (44) private banks in Iraq. A questionnaire, which has been designed according to a number of international standards, has been used. It's made of (29) items that cover the three variables to test their hypotheses. A number of statistical tools have been used A number of conclusion have been reached and recommendations have also been suggested.
In this paper, we investigate the automatic recognition of emotion in text. We perform experiments with a new method of classification based on the PPM character-based text compression scheme. These experiments involve both coarse-grained classification (whether a text is emotional or not) and also fine-grained classification such as recognising Ekman’s six basic emotions (Anger, Disgust, Fear, Happiness, Sadness, Surprise). Experimental results with three datasets show that the new method significantly outperforms the traditional word-based text classification methods. The results show that the PPM compression based classification method is able to distinguish between emotional and nonemotional text with high accuracy, between texts invo
... Show MoreLoanwords are the words transferred from one language to another, which become essential part of the borrowing language. The loanwords have come from the source language to the recipient language because of many reasons. Detecting these loanwords is complicated task due to that there are no standard specifications for transferring words between languages and hence low accuracy. This work tries to enhance this accuracy of detecting loanwords between Turkish and Arabic language as a case study. In this paper, the proposed system contributes to find all possible loanwords using any set of characters either alphabetically or randomly arranged. Then, it processes the distortion in the pronunciation, and solves the problem of the missing lette
... Show MoreCloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show MorePredicting permeability is a cornerstone of petroleum reservoir engineering, playing a vital role in optimizing hydrocarbon recovery strategies. This paper explores the application of neural networks to predict permeability in oil reservoirs, underscoring their growing importance in addressing traditional prediction challenges. Conventional techniques often struggle with the complexities of subsurface conditions, making innovative approaches essential. Neural networks, with their ability to uncover complicated patterns within large datasets, emerge as a powerful alternative. The Quanti-Elan model was used in this study to combine several well logs for mineral volumes, porosity and water saturation estimation. This model goes be
... Show MoreData centric techniques, like data aggregation via modified algorithm based on fuzzy clustering algorithm with voronoi diagram which is called modified Voronoi Fuzzy Clustering Algorithm (VFCA) is presented in this paper. In the modified algorithm, the sensed area divided into number of voronoi cells by applying voronoi diagram, these cells are clustered by a fuzzy C-means method (FCM) to reduce the transmission distance. Then an appropriate cluster head (CH) for each cluster is elected. Three parameters are used for this election process, the energy, distance between CH and its neighbor sensors and packet loss values. Furthermore, data aggregation is employed in each CH to reduce the amount of data transmission which le
... Show MoreUnder cyclic loading, aluminum alloys exhibit less fatigue life than steel alloys of similar strength and this is considered as Achilles's heel of such alloys. A nanosecond fiber laser was used to apply high speed laser shock peening process on thin aluminum plates in order to enhance the fatigue life by introducing compressive residual stresses. The effect of three working parameters namely the pulse repetition rate (PRR), spot size (ω) and scanning speed (v) on limiting the fatigue failure was investigated. The optimum results, represented by the longer fatigue life, were at PRR of 22.5 kHz, ω of 0.04 mm and at both v's of 200 and 500 mm/sec. The research yielded significant results represented by a maximum percentage increase in the fa
... Show More