Preferred Language
Articles
/
Hhb0HooBVTCNdQwC9pH4
Double Stage Shrinkage Estimator in Pareto Distribution
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Wasit Journal For Pure Sciences
Suitable Methods for Solving COVID-19 Model in Iraq
...Show More Authors

Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 26 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE ROLE OF FINANCIAL INCLUSION IN PROVIDING FINANCIAL SUPPORT WOMEN IN IRAQ: THE ROLE OF FINANCIAL INCLUSION IN PROVIDING FINANCIAL SUPPORT WOMEN IN IRAQ
...Show More Authors

This study dealt with the basics of financial inclusion in terms of concept, importance and objectives, The empowerment of women financially and bank ,and then the relationship between financial inclusion and women, and determine the requirements of inclusion Financial resources for women. The analytical descriptive method was used for data, which included reviewing and analyzing information and data in economic and financial literature. The study: reached a number of conclusions, the most important of which are Financial inclusion contributes to women's financial and banking support, as there is a positive relationship between financial institutions Banking and women's access to financial and banking services, thus playing a rol

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
Determination of Similarity and Variance in Energy and Depositional Environment, the Difference in Diagenesis and the Variance in the Petrophysical Properties of Reservoir Rocks in Zubair Formation , South Iraq
...Show More Authors

Records of two regionalized variables were processed for each of porosity and permeability of reservoir rocks in Zubair Formation (Zb-109) south Iraq as an indication of the most important reservoir property which is the homogeneity , considering their important results in criterion most needed for primary and enhanced oil reservoir .Z and F tests that were calculated for the two above mentioned properties of pair units of Zubair Formation have shown the difference in depositional energy and different diagenesis between units IL and AB , DJ and AB , and the similarity in grains size , sorting degree , depositional environment and pressure gradients between IL and AB units , LS and IL units ; also the difference in the properties above betw

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Journal Of Educational And Psychological Researches
Analysis of Palestinian Ministry of Education Test Results in Mathfor Eighth Graders basic Public Schools in Tulkarm
...Show More Authors

هدفت هذه الدراسة إلى تحليل نتائج الاختبار الوطني الموحد الذي تطبقه وزارة التربية والتعليم الفلسطينية في مادة الرياضيات لطلبة الصف الثامن الأساسي في المدارس الحكومية في محافظة طولكرم، وذلك لمعرفة مستوى الطلبة على هذا الاختبار في ضوء متغيرات الجنس والمنطقة التعليمية ونوع المدرسة، ومعرفة علاقة التحصيل على هذا الاختبار بتحصيل الطلبة المدرسي والمعدل العام. ولتحقيق ذلك تم تحليل درجات (3218) طالباً وطالبة؛ وهم ي

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 03 2024
Journal Name
International Journal Of Social Trends
Digital Literacy and Its Importance in the Modern Workforce
...Show More Authors

Digital literacy is crucial in the modern workforce, where technology plays an integral role in daily operations. This abstract explores the significance of digital literacy in enhancing productivity, efficiency, and competitiveness in the workplace. Digital literacy encompasses the ability to use and navigate digital tools and platforms effectively, including software, applications, and online communication tools. In today's digital age, employers increasingly value candidates with strong digital skills, as they are better equipped to adapt to rapidly evolving technologies. This abstract highlights the importance of digital literacy in empowering employees to perform tasks more efficiently, collaborate seamlessly, and innovate effecti

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 14 2023
Journal Name
Al-academy
Luxury in jewelry design
...Show More Authors

The current research dealt with the presence of ornaments and jewelry since ancient times، which express the social، religious or emotional status of the person who adorns them، in addition to being distinguished by a distinct aesthetic and luxury، that is، in a sense closely related to the social and economic status of people، and we note that jewelry is considered a symbol of luxury and luxury، and hence The need to study luxury appeared in the design of ornaments and jewelry because it refers to the adornment elements that are made of metals and precious stones، which actually indicate signs of status or position that distinguish social classes from each other. The problem was identified by the following question: Determine th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Some Semi-parametric Methods in Partial Linear Single-Index Model
...Show More Authors

The research dealt with a comparative study between some semi-parametric estimation methods to the Partial linear Single Index Model using simulation. There are two approaches to model estimation two-stage procedure and MADE to estimate this model. Simulations were used to study the finite sample performance of estimating methods based on different Single Index models, error variances, and different sample sizes , and the mean average squared errors were used as a comparison criterion between the methods were used. The results showed a preference for the two-stage procedure depending on all the cases that were used

View Publication Preview PDF
Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
Structural Design According to Constructal Theory in Architecture
...Show More Authors
Abstract<p>Constructal theory plays a major role in the conceptual design stage of the structural system in architecture. It provides a conceptual framework for predicting the form depending on natural systems to model those systems geometrically according to the constructal law that works in two directions: the first is towards predicting the general form of the structural system, and the second is the physical application of the law in the process of detailed design of the parts of the system. The aim of this paper is to determine the mechanism adopted in the structural design according to the constructal theory, assuming that the structural design according to the constructal theory achieves </p> ... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Study the spectroscopic characteristics of Rhodamine B Dye in Ethanol and Methanol mixture and Calculation the Quantum Efficiency
...Show More Authors

The effect of ethanol and methanol solvent, and their mixture has been studied on the absorption and fluorescence spectra of laser dye Rhodamine B at concentration of (10-4) Molar at room temperature. The molar absorption coefficient has been determined for mixture which was (3.223) at wave number (18181.8 cm-1), Also the Quantum Efficiency of the two solvents (ethanol and methanol) and their mixture have been calculated ,which was for mixture spectrum (38.94%) and it was larger comparing with other and solvents. The characteristics of spectrum has been determined by calculating (??) of absorption spectrum for the solvents and its mixture at maximum wave number ( ) cm-1 depending on solvent polarity and the transitions between molecular ene

... Show More
View Publication Preview PDF
Crossref (1)
Crossref