The search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.
The experiences in the life are considered important for many fields, such as industry, medical and others. In literature, researchers are focused on flexible lifetime distribution.
In this paper, some Bayesian estimators for the unknown scale parameter of Inverse Rayleigh Distribution have been obtained, of different two loss functions, represented by Suggested and Generalized loss function based on Non-Informative prior using Jeffery's and informative prior represented by Exponential distribution. The performance of estimators is compared empirically with Maximum Likelihood estimator, Using Monte Carlo Simulation depending on the Mean Square Error (MSE). Generally, the preference of Bayesian method of Suggeste
... Show MoreThe research tried to show the importance of Administrative Control being one of the important means in administrative work; they work on the review and audit work done and error handling explored in the work and prevent the occurrence and ascertain the extent of implementation of the planned targets, and therefore this is reflected in raising the efficiency of the performance of the tax examiner and complete the work as soon as possible and the highest efficiency and reduce the gaps that may occur between the parties of the tax settling accounts and dealt with in the theoretical side of the search to the research problem, namely with whether operating management oversight to improve the performance and increase the efficiency of t
... Show MoreBackground: Lead-acid battery workers are at higher risk for systemic diseases as well as oral diseases like dental caries. The aim of this study was to assess selected salivary antioxidants and their relation with dental caries among lead acid battery factory workers in comparison with non-exposed group. Materials and methods: The sample consisted of 35 subjects aged 35-45 year-old who worked in Babylon lead acid battery factory in Baghdad city and matching group that not exposed to lead were selected as a control. Dental caries severity was recorded by using DMFS index, stimulated salivary samples were collected and analyzed for the measurement of salivary antioxidants (uric acid, total protein, catalase and glutathione peroxidase enzymes
... Show MoreBackground: Gasoline constituents and its derivatives had many hazardous effects on the general health of humans. Thus, gasoline stations workers may be affected by different types of related diseases.This study was conducted to assess selected salivary elements and their relation with dental caries, oral hygiene status and periodontal diseases among gasoline stations workers in comparison with individuals have no regular exposure to gasoline. Materials and methods: The study group consists of thirty male subjects with an age range (33-39) years who worked in different gasoline stations in different areas of Baghdad city and thirty persons that matching in age and gender and not exposed to gasoline were selected as a control group. Dental c
... Show MoreThis paper is devoted to compare the performance of non-Bayesian estimators represented by the Maximum likelihood estimator of the scale parameter and reliability function of inverse Rayleigh distribution with Bayesian estimators obtained under two types of loss function specifically; the linear, exponential (LINEX) loss function and Entropy loss function, taking into consideration the informative and non-informative priors. The performance of such estimators assessed on the basis of mean square error (MSE) criterion. The Monte Carlo simulation experiments are conducted in order to obtain the required results.
Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security. We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly. We make an effort to prove
... Show More