645 research outputs found

    A New Extension of Power Hazard Distribution with Applications

    Get PDF
    A new lifetime distribution is suggested using the Sine function by considering power hazard distribution as baseline distribution. Some mathematical and statistical features are discussed. The Maximum likelihood method is used to estimate the parameters for proposed distribution. Three real data sets are examined to analyze the performance of proposed distribution with some other distributions. The new distribution has been shown better fit to the bladder cancer patients’ data and COVID-19 data as compared to some distributions through statistical criterion

    The Demand for Military Spending in Egypt

    Get PDF
    Egypt plays a pivotal role in the security of the Middle East as the doorway to Europe and its military expenditure reflects its involvement in the machinations of such an unstable region, showing considerable variation over the last forty years. These characteristics make it a particularly interesting case study of the determinants of military spending. This paper presents such a study, estimating an econometric model of the Egyptian demand for military spending, taking into account important strategic and political factors. Both economic and strategic factors are found to play a role in determining military burden, with clear positive effects of lagged military burden, suggesting some sort of institutional inertia, plus negative output and net imports effects. The main strategic effect is the impact of Israel’s military burden, with no effect for that of the Jordanian and Syrian allies, but the results also suggest that simple arms race relationships are not an adequate representation of the relevant strategic factors.Egypt, demand for military expenditure, political determinants, strategic determinants

    Using platelet-to-lymphocyte ratio as a diagnostic marker in malignant ovarian tumors

    Get PDF
    Background: Ovarian malignancy, is the fifth global fatal disease for women, and the most common cause of death in Gynecological cancer. Objective was to evaluate any diagnostic role of Platelet-to-lymphocyte ratio in epithelial ovarian tumors.Methods: A prospective analysis, over 1 year; (October 2016 to October 2017). Setting: University hospital’s Gynaecological oncology centre. Subjects & Methodology: A total of 36 patients with epithelial ovarian tumors, not under any adjuvant therapy and negative for any other malignancy, or any blood diseases causing blood count changes. All subjects underwent preoperative assessment of CA125 and Platelet-to-lymphocyte ratio (PLR), followed by a staging laparotomy and the appropriate management according to the standard protocols. Postoperative histopathological confirmation of the disease type, stage and grade was done for all cases.Results: (77.8%) of the patients had early stage disease while (22.2%) had advanced stage. Neither mean platelet, lymphocytic counts, nor PLR express any significant difference between early and late stage disease. CA 125 levels, however changed significantly in advanced stages. PLR showed a statistically significant difference between the three stages of the disease (P=0.007).   There was a positive correlation between PLR and CA125 (r=0.184 and P=0.283).Conclusions: PLR rise significantly with tumor stages and correlates significantly with CA125. No significant change in PLR values with tumor type or grade. PLR might be a potential diagnostic / prognostic marker of ovarian epithelial cancer

    A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC

    Get PDF
    Over the past few decades, the art of secretly embedding and communicating digital data has gained enormous attention because of the technological development in both digital contents and communication. The imperceptibility, hiding capacity, and robustness against attacks are three main requirements that any video steganography method should take into consideration. In this paper, a robust and secure video steganographic algorithm in discrete wavelet transform (DWT) and discrete cosine transform (DCT) domains based on the multiple object tracking (MOT) algorithm and error correcting codes is proposed. The secret message is preprocessed by applying both Hamming and Bose, Chaudhuri, and Hocquenghem codes for encoding the secret data. First, motion-based MOT algorithm is implemented on host videos to distinguish the regions of interest in the moving objects. Then, the data hiding process is performed by concealing the secret message into the DWT and DCT coefficients of all motion regions in the video depending on foreground masks. Our experimental results illustrate that the suggested algorithm not only improves the embedding capacity and imperceptibility but also enhances its security and robustness by encoding the secret message and withstanding against various attacks

    Improving the Performance of a Series-Parallel System Based on Lindley Distribution

    Get PDF
    In this article, the performance of a series-parallel system is improved. The system components are assumed to follows independently and identically Lindley distributed with three parameters. The system reliability for the given system will be improved by using reduction method, hot, cold and imperfect duplication method. Some reliability measures are derived. Two types of reliability equivalence factors and gamma fractiles are calculated. A numerical example is introduced to explain the theoretical results

    Novel Steganography Over HTML Code Process

    Get PDF
    Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and encryption concepts
    • …
    corecore