In this article, we developed a new loss function, as the simplification of linear exponential loss function (LINEX) by weighting LINEX function. We derive a scale parameter, reliability and the hazard functions in accordance with upper record values of the Lomax distribution (LD). To study a small sample behavior performance of the proposed loss function using a Monte Carlo simulation, we make a comparison among maximum likelihood estimator, Bayesian estimator by means of LINEX loss function and Bayesian estimator using square error loss (SE) function. The consequences have shown that a modified method is the finest for valuing a scale parameter, reliability and hazard functions.
STAG3 is the meiotic component of cohesin and a member of the Cancer Testis Antigen (CTA) family. This gene has been found to be overexpressed in many types of cancer, and recently, its variants have been implicated in other disorders and many human diseases. Therefore, this study aimed to analyze the major variants of STAG3. Western blot (WB) and immunoprecipitation (IP) assays were performed using two different anti-STAG3 antibodies that targeted the relevant protein in MCF-7, T-47D, MDA-MB-468, and MDA-MB-231 breast cancer cells with Jurkat and MCF-10A cells as positive and negative controls, respectively. In silico analyses were searched to study the major isoforms. WB and IP assays revealed two abundant polypeptides < 191 kDa and
... Show MoreThis work aims to analyse the dynamic behaviours of the forest pest system. We confirm the forest pest system in plane for limit cycles bifurcating existence from a Hopf bifurcation under certain conditions by using the first Lyapunov coefficient and the second-order of averaging theory. It is shown that all stationary points in this system have Hopf bifurcation points and provide an estimation of the bifurcating limit cycles.
Background: The insertion torque (IT) values and implant stability quotient (ISQ) values are the measurements most used to assess primary implant stability. This study aimed to assess the relationship between ISQ values and IT. Materials and methods: This study included 24 patients with a mean (SD) age of 47.9 (13.64) years (range 25-75 years). The patients received 42 dental implants (DI), 33 in the mandible and 9 in the maxilla. The DI were installed using the motorized method with 35 Ncm torque, When DI could not be inserted to the requisite depth by the motorized method, a hand ratchet was used and the IT was recorded as ˃ 35 Ncm. Implant stability was measured utilizing Osstell® ISQ. The secondary stability was measured after 16
... Show MoreAbstract
The research aims to identify the extent of the practice of social responsibility in accordance with the social dimension and diagnosis of constraints applied.
Find the problem represented by the Social Responsibility and obstacles facing application in Baghdad Municipality through their workers trends analysis.
The adoption of the statistical method to analyze the data and information gathering, and selected municipalities of Adhamiya and Kadhimiya deliberate manner applied as a state and municipal councils of both cities as representatives of the local community to be the subject of research and comparison between them to see the reality of soci
... Show More إن المقصود باختبارات حسن المطابقة هو التحقق من فرضية العدم القائمة على تطابق مشاهدات أية عينة تحت الدراسة لتوزيع احتمالي معين وترد مثل هكذا حالات في التطبيق العملي بكثرة وفي كافة المجالات وعلى الأخص بحوث علم الوراثة والبحوث الطبية والبحوث الحياتية ,عندما اقترح كلا من Shapiro والعالم Wilk عام 1965 اختبار حسن المطابقة الحدسي مع معالم القياس
(
In this study, the investigation of Local natural Iraqi rocks kaolin with the addition of different proportions of bauxite and its effect on the physical and mechanical properties of the produced refractories was conducted. Kaolin/bauxite mixture was milled and classified into various size fractions, the kaolin (less than 105 μm) and the bauxite (less than 70μm). The specimens were mixed from kaolin and bauxite in ranges B1 (95+5)%, B2 (90+10)%, B3(85+15)%, and B4 (80+20)% respectively. The green specimens were shaped by the semi-dry method using a hydraulic press and a molding pressure of 7 MPa with the addition of (9-12) %wt. of PVA ratio. After molding and drying, the specimens were fired at (1100, 1200 and 13
... Show MoreThe Shiranish Formation is cropped out in several areas in northern Iraq. A stratigraphic and facies study was conducted within the Duhok region to determine the sedimentary environment. Three microfacies, reflecting the various subenvironments within different shelf parts of the deep sea, have been identified within the Shiranish Formation. Four depositional environments are identified: slope, the toe of slope, deep shelf, and deep-sea or cratonic deep basin. The Shiranish Formation in the Duhok region, Northern Iraq, was deposited in an open shelf carbonate platform. The Shiranish Formation sequence is divided into six third-order cycles in the study area. These asymmetrical cycles reflect an imbalance between the relative level of the
... Show MoreAbstract:
The achievement of economic and social welfare for individual is the main target to all policies that adopted by all countries worldwide either were economic, social, political or others. The obtaining of education by individuals and especially the higher education is one of the most important determinates in achieving the wellbeing and lasted economic development. This is because via the higher education new fields can be opened in front of individuals in order to get adequate jobs associated with their scientific specialization. This is allowing educated individuals gain higher income that can reduce the gap of income inequality.
Thus, this paper aims to analysis the n
... Show MoreCloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak
... Show More