The book The Laws of Duwan of Mamati's Son (T, 606 E) His approach to his narratives is a topic of historical and civilized importance. The Fatimid Age of the People of Jehovah has expanded its influence and authority, including ministers, writers, doughnuts and foreshores. One of the Christian families that shined in the late Fatmi era was "Mamati", who lived in "Assiut" from Upper Egypt, then moved to Cairo, and enrolled in the service of the Fatimids, where their sons held important positions in State offices.Ibn Mamati became in charge of the Army Office and then added to it the Finance Office, which became the most important downs in Egypt. Through his work in the Duwan Law Books, this book was a living record of the Dawawans in the Ay
... Show MoreThe acceptance sampling plans for generalized exponential distribution, when life time experiment is truncated at a pre-determined time are provided in this article. The two parameters (α, λ), (Scale parameters and Shape parameters) are estimated by LSE, WLSE and the Best Estimator’s for various samples sizes are used to find the ratio of true mean time to a pre-determined, and are used to find the smallest possible sample size required to ensure the producer’s risks, with a pre-fixed probability (1 - P*). The result of estimations and of sampling plans is provided in tables.
Key words: Generalized Exponential Distribution, Acceptance Sampling Plan, and Consumer’s and Producer Risks
... Show MoreAs a well-known oral and intravenous antifungal, voriconazole (VRN) has an extensive history of usage in the medical field. Solid lipid nanoparticles (SLNs) have been produced to treat ocular fungal keratitis in the eye. A 32Box-behnken design was used to produce a variety of new formulas for hot-melt extrusion. The SLNs were evaluated by entrapment efficiency (EE percent), particle size (PS), polydispersity index (PDI), and zeta potential (ZP). A series of in-vitro and in-vivo studies were carried out on the new formula. The produced vesicles’ EE, PS, PDI, and ZP values were all good. SLNs eye drops were numerically adjusted to include carbopol, a stabilizer, lipids, and a surfactant, among other substances. ZP of -36.5 ± 0.20 m
... Show MoreIn this paper, two elements of the multi-input multi-output (MIMO) antenna had been used to study the five (3.1-3.55GHz and 3.7-4.2GHz), (3.4-4.7 GHz), (3.4-3.8GHz) and (3.6-4.2GHz) 5G bands of smartphone applications that is to be introduced to the respective US, Korea, (Europe and China) and Japan markets. With a proposed dimension of 26 × 46 × 0.8 mm3, the medium-structured and small-sized MIMO antenna was not only found to have demonstrated a high degree of isolation and efficiency, it had also exhibited a lower level of envelope correlation coefficient and return loss, which are well-suited for the 5G bands application. From the fabrication of an inexpensive FR4 substrate with a 0.8 mm thickness level, a loss tang
... Show MoreThis research include building mathematical models for aggregating planning and shorting planning by using integer programming technique for planning master production scheduling in order to control on the operating production for manufacturing companies to achieve their objectives of increasing the efficiency of utilizing resources and reduce storage and improving customers service through deliver in the actual dates and reducing delays.
In this study, we focused on the random coefficient estimation of the general regression and Swamy models of panel data. By using this type of data, the data give a better chance of obtaining a better method and better indicators. Entropy's methods have been used to estimate random coefficients for the general regression and Swamy of the panel data which were presented in two ways: the first represents the maximum dual Entropy and the second is general maximum Entropy in which a comparison between them have been done by using simulation to choose the optimal methods.
The results have been compared by using mean squares error and mean absolute percentage error to different cases in term of correlation valu
... Show More
In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.
Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor
... Show More