Preferred Language
Articles
/
lhdMfJIBVTCNdQwC9LH4
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Feb 01 2019
Journal Name
Indian Journal Of Natural Sciences
Surface Photometry and Morphology Properties of Spiral Galaxies: NGC4725, NGC4639 as Case Study
...Show More Authors

In this study, two active galaxies (NGC4725, NGC4639) have been chosen to study their morphological and photometric properties, by using the IRAF ISOPHOTE ELLIPS task with griz-filters. Observations are obtained from the Sloan Digital Sky Survey (SDSS) which reaches now to the DATA Release (DR14). The data reduction of all images (bias and flat field) has been done by SDSS Pipeline. The surface photometric investigation was performed like the magnitude. Together with isophotal contour maps, surface brightness profiles and a bulge/disk decomposition of the images of the galaxies, although the disk position angle, ellipticity, and inclination of the galaxies have been done. Also, the color of galaxies was studied, where chromatic distribution

... Show More
View Publication
Publication Date
Wed Sep 30 2015
Journal Name
European Journal Of Chemistry
Reaction pathways and transition states of the C-C and C-H bond cleavage in the aromatic pyrenemolecule - A Density Functional study
...Show More Authors

The activation and reaction energies of the C-C and C-H bonds cleavage in pyrene molecule are calculated applying the Density Functional Theory and 6-311G Gaussian basis. Different values for the energies result for the different bonds, depending on the location of the bond and the structure of the corresponding transition states. The C-C bond cleavage reactions include H atom migration, in many cases, leading to the formation of CH2 groups and H-C≡C- acetylenic fragments. The activation energy values of the C-C reactions are greater than 190.00 kcal/mol for all bonds, those for the C-H bonds are greater than 160.00 kcal/mol. The reaction energy values for the C-C bonds range between 56.497 to 191.503 kcal/mol. As for the C-H cleavage rea

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
The Phenomenon of Division and Modification of The Individual Houses in Baghdad after 2003
...Show More Authors

The Research deals with the negative phenomena which appeared in the urban scenes of the  Iraqi cities after 2003, particularly trespassing the architectural design of the urban Individual houses.  Many academic researchers , critics, and cultural circles, drawn attention to the impact of  political and cultural variable change on such phenomena  without detailed  analysis . The research problem  is set according to central questions : If the phenomena is the trespass , what
are the sides which are being trespassed  in the division of the individual house? , If the diagnosis of the phenomena denotes perceived repetition of the cases , So what's size of this transposes on the architectural design of t

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 03 2013
Journal Name
Al-kindy College Medical Journal
Conservative Treatment of Closed Fracture Shaft Humerus in Adult Patients
...Show More Authors

Background: Fractures of the humeral shaft accounting for approximately 3% of all fractures. There is a wide array of good options for their treatment and controversy over the best methods. Although good techniques of osteosynthesis are available, the aim of this article is toemphasize on the benefit and good outcome of conservative treatment for properly selected cases to decrease the cost and avoid the complications of surgery. Method : During the period from February 2011 to June 2012 fifty-five fractures of humeral shaft were treated at orthopedicdepartment in the ALKindyteaching hospital. 22 fractures considered suitable for the study. The patients treatedconservatively by using the‘U’ shaped coaptation slab. Then we shift to POP c

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
College Of Islamic Sciences
Education of Thinking as a Necessity in Education Inst. Asmaa Hasan Shalash
...Show More Authors

The concept of education is not actually restricted to children or school students, but rather  every person   should be educated and followed up if he  is intended to grow and prove, with effort and time allocation  as to fulfill that goal.  Thus , the current paper aims to a thinking education and to educate that thinking in teacher  and it is not new to deal with the personal characteristics of teacher  in the different  scientific , and educational researches . But ,these research did not address the necessity of acquiring the skill of thinking, especially as it affects teacher's presentation of the content of the curriculum or even content outside the curriculum, and therefore, there is n

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Bubble Size Distribution In Gas-Liquid Dispersion Column
...Show More Authors

The present work investigates the effect of; superficial air velocities of: 1, 3, and 6 cm/s for two types of perforated distributor on hydrodynamic characteristic in a gas-liquid dispersion column of; air-water, and airaqueous-n-propanol solution. Bubble distribution, gas holdup, and power consumption are parameters take in consideration. Experimental work was carried out in perspex column of 8.5 cm inside diameter and 1.5 m height. Two types of bubble generator (perforated plate) were fixed at the bottom of the column; plate A (99 holes of 0.5 mm diameter and free area of 0.34%), plate B (20 holes of 1.5 mm diameter and free area of 0.62%). Photographic technique was used to measure the bubble parameters. The experimental results were

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 11 2018
Journal Name
Iraqi Journal Of Physics
The antibacterial activity of indium oxide thin film prepared by thermal deposition
...Show More Authors

Indium oxide In2O3 thin films fabricated using thermal evaporation of indium metal in vacuum on a glass substrate at 25oC using array mask, after deposition the indium films have been subjected to thermal oxidation at temperature 400 °C for 1h. The results of prepared Indium oxide reveal the oxidation method as a strong effect on the morphology and optical properties of the samples as fabricated. The band gap (Eg) of In2O3 films at 400 °C is 2.7 eV. Then, SEM and XRD measurements are also used to investigate the morphology and structure of the indium oxide In2O3 thin films. The antimicrobial activity of indium oxide In2O3 thin films was assessed against gram-negative bacterium using inhibition zone of bacteria which improved higher ina

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The impact of market orientation and the commitment of employees to performance
...Show More Authors

أستهدفت الدراسة اختبار أثر التوجه السوقي والتزام العاملين على أداء المنظمة المسوقة لخدمات النقل الجوي. حيث تم اختيار شركة الخطوط الجوية الملكية الأردنية كمجال تطبيقي.وقد اعتمدت الدراسة في قياس المتغيرات على مقاييس مختبرة وقد تأكد صحتها وثباتها لقياس المتغيرات في البيئة الحالية.  وقد بينت نتائج التحليل الإحصائي الذي استخدمت فيه أساليب إحصائية مختلفة بالاستعانة ببرنامج SPSS))

... Show More
View Publication Preview PDF
Crossref