This study employs wavelet transforms to address the issue of boundary effects. Additionally, it utilizes probit transform techniques, which are based on probit functions, to estimate the copula density function. This estimation is dependent on the empirical distribution function of the variables. The density is estimated within a transformed domain. Recent research indicates that the early implementations of this strategy may have been more efficient. Nevertheless, in this work, we implemented two novel methodologies utilizing probit transform and wavelet transform. We then proceeded to evaluate and contrast these methodologies using three specific criteria: root mean square error (RMSE), Akaike information criterion (AIC), and log-likelihood (LogL). The wavelet transform method works better than the probit transform method at all three levels of correlation, as shown by a simulated study with four types of copulas, five sample sizes, and three levels of correlation. Research has demonstrated that probit transformation methods are most appropriate for linkages involving large and medium sample sizes, as indicated by Frank, Joe, and Tawn Copula. On the other hand, for copula functions for all sample sizes, the wavelet transform method was found to be ideal in cases with low
Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreThe aim of the current study is to identify the level of goal conflict with twelfth-grade students in South Sharqiah/ Sultanate of Oman according to gender and specialization. The study used the descriptive method. A scale of (28) items was developed and divided into six dimensions: time pressure, goal achievement, limit of power, limit of budget, incompatible strategies, and unclear task. To validate the scale, it was piloted (40) students. The scale was administered to a sample of (402) students (209) males in the Governorate of South Sharqiah. The results showed that the conflict level was high in “unclear task”, and an average conflict level in “limit of power”. Other dimensions (goal achievement, time pressure, limit of powe
... Show MoreData steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods
... Show MoreIn this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.
The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi
... Show MoreThermal pyrolysis kinetics of virgin high-density polyethylene (HDPE) was investigated. Thermal pyrolysis of HDPE was performed using a thermogravimetric analyzer in nitrogen atmosphere under non-isothermal conditions at different heating rates 4, 7, 10 °C/min. First-order decomposition reaction was assumed, and for the kinetic analysis Kissinger-Akahira-Sunose(KAS), Flynn-Wall-Ozawa(FWO) and Coats and Redfern(CR) method were used. The obtained values of average activation energy by the KAS and FWO methods were equal to137.43 and 141.52 kJ/mol respectively, these values were considered in good agreement, where the average activation energy value obtained by CR equation methods was slightly different which equal to 153.16 kJ/
... Show MoreBackground: The patient's vital signs must stay stable pre a pulmonary function test since the approach demands the patient to breathe slowly and deeply and exhale quickly. However, events that cause variations in normal vital signs may impact the patient. Many strategies can be utilized to stabilize vital signs, including music treatment. The purpose of this study is to compare the effectiveness of music therapy on the vital signs of client's pre a pulmonary function test. Methods: An experimental design study with an application (pre-test, post-test), to determine the effectiveness of music therapy for clients pre pulmonary function test for 106 clients in Al-Diwaniyah, Al-Shamiya, and Al- Hamza public hospitals In Iraq. Parti
... Show More