Preferred Language
Articles
/
lhdMfJIBVTCNdQwC9LH4
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I Article Sidebar
...Show More Authors

n this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used: local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the types of the kernel boundary functions and suggested that the 2xRectangle and 2xEpanechnikov methods reflect the best results if compared to the other estimators

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jan 30 2014
Journal Name
Al-kindy College Medical Journal
Rising Rate of Cesarean Section
...Show More Authors

Cesarean section, which was introduced into clinical practice as a lifesaving procedure for both the mother and the baby, is one of the most common surgeries performed in modern obstetrics. Formerly it was performed in interest of the mother; currently it is frequently done for fetal indication. As other procedures of some complexity, its use follows the health care inequity pattern of the world; underuse in low income setting, and adequate or even unnecessary use in middle and high income setting (1).
The first modern cesarean section was performed by German gynecologist Ferdinand Adolf Kehrer in 1881. Cesarean section is often performed when a vaginal delivery would put the baby's or mother's life or health at risk. Many are also pe

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 04 2017
Journal Name
Al-qadisiyah Journal For Administrative And Economic Sciences
Survival Function Estimating of Single age Groups for Generalized Gamma Distribution with Simulation.
...Show More Authors

The analysis of survival and reliability considered of topics and methods of vital statistics at the present time because of their importance in the various demographical, medical, industrial and engineering fields. This research focused generate random data for samples from the probability distribution Generalized Gamma: GG, known as: "Inverse Transformation" Method: ITM, which includes the distribution cycle integration function incomplete Gamma integration making it more difficult classical estimation so will be the need to illustration to the method of numerical approximation and then appreciation of the function of survival function. It was estimated survival function by simulation the way "Monte Carlo". The Entropy method used for the

... Show More
Preview PDF
Publication Date
Tue Aug 06 2013
Journal Name
Robotica
Function approximation technique-based adaptive virtual decomposition control for a serial-chain manipulator
...Show More Authors
SUMMARY<p>The virtual decomposition control (VDC) is an efficient tool suitable to deal with the full-dynamics-based control problem of complex robots. However, the regressor-based adaptive control used by VDC to control every subsystem and to estimate the unknown parameters demands specific knowledge about the system physics. Therefore, in this paper, we focus on reorganizing the equation of the VDC for a serial chain manipulator using the adaptive function approximation technique (FAT) without needing specific system physics. The dynamic matrices of the dynamic equation of every subsystem (e.g. link and joint) are approximated by orthogonal functions due to the minimum approximation errors produced. The contr</p> ... Show More
View Publication
Scopus (27)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
INVESTIGATION OF TWISTED TAPE TURBULATOR FOR FIRE TUBE BOILER Part I. Heat Transfer
...Show More Authors

The present work presents a new experimental study of the enhancement of turbulent
convection heat transfer inside tubes for combined thermal and hydrodynamic entry length of one
popular “turbulator” (twisted tape with width slightly less than internal tube diameter) inserted for
fire tube boilers. Cylindrical combustion chamber was used to burn (1.6 to 7kg/h) fuel oil #2 to
deliver hot gases with ranges of Reynolds number (10500 to 21700), and (11400 to 24150) for both
empty and inserted tube respectively.A uniform wall temperature technique was used by keeping
approximately constant water temperature difference (25ºC) between inlet and exit cooling water in
parallel flow shell and tube heat exchanger. The test

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Improve studies and calculations for the Bose-Einstein condensation D-D fusion reaction rate
...Show More Authors

A theoretical study including the effects of the fusion characteristics parameters on the fundamental fusion rate for the BEC state in D-D fusion reaction is deal with varieties physical parameters such as the fuels density, fuel temperature and the astrophysics S-factor are processed to bring an approximately a comparable results to agree with the others previously studies.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of penetration Rate and cost with Artificial Neural Network for Alhafaya Oil Field
...Show More Authors

Prediction of penetration rate (ROP) is important process in optimization of drilling due to its crucial role in lowering drilling operation costs. This process has complex nature due to too many interrelated factors that affected the rate of penetration, which make difficult predicting process. This paper shows a new technique of rate of penetration prediction by using artificial neural network technique. A three layers model composed of two hidden layers and output layer has built by using drilling parameters data extracted from mud logging and wire line log for Alhalfaya oil field. These drilling parameters includes mechanical (WOB, RPM), hydraulic (HIS), and travel transit time (DT). Five data set represented five formations gathered

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Design of Multi-Rate Multi-Zone Wireless Fuzzy Temperature Control System for Greenhouse Application
...Show More Authors

sensor sampling rate (SSR) may be an effective and crucial field in networked control systems.  Changing sensor sampling period after designing the networked control system is a critical matter for the stability of the system. In this article, a wireless networked control system with multi-rate sensor sampling is proposed to control the temperature of a multi-zone greenhouse. Here, a behavior based Mamdany fuzzy system is used in three approaches, first is to design the fuzzy temperature controller, second is to design a fuzzy gain selector and third is to design a fuzzy error handler. The main approach of the control system design is to control the input gain of the fuzzy temperature controller depending on the cur

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 25 2023
Journal Name
Ieee Access
ITor-SDN: Intelligent Tor Networks-Based SDN for Data Forwarding Management
...Show More Authors

Tor (The Onion Routing) network was designed to enable users to browse the Internet anonymously. It is known for its anonymity and privacy security feature against many agents who desire to observe the area of users or chase users’ browsing conventions. This anonymity stems from the encryption and decryption of Tor traffic. That is, the client’s traffic should be subject to encryption and decryption before the sending and receiving process, which leads to delay and even interruption in data flow. The exchange of cryptographic keys between network devices plays a pivotal and critical role in facilitating secure communication and ensuring the integrity of cryptographic procedures. This essential process is time-consuming, which causes del

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref