Preferred Language
Articles
/
aRfqApABVTCNdQwCTYIB
Some of the Probability Characteristics Functions of the Solution of a System of Random Linear Inequalities
...Show More Authors

Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Using Adaptive Neuro Fuzzy Inference System to Predict Rate of Penetration from Dynamic Elastic Properties
...Show More Authors

Rate of penetration plays a vital role in field development process because the drilling operation is expensive and include the cost of equipment and materials used during the penetration of rock and efforts of the crew in order to complete the well without major problems. It’s important to finish the well as soon as possible to reduce the expenditures. So, knowing the rate of penetration in the area that is going to be drilled will help in speculation of the cost and that will lead to optimize drilling outgoings. In this research, an intelligent model was built using artificial intelligence to achieve this goal.  The model was built using adaptive neuro fuzzy inference system to predict the rate of penetration in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 13 2020
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
Robust Approach of Optimal Control for DC Motor in Robotic Arm System using Matlab Environment
...Show More Authors

Modern automation robotics have replaced many human workers in industrial factories around the globe. The robotic arms are used for several manufacturing applications, and their responses required optimal control. In this paper, a robust approach of optimal position control for a DC motor in the robotic arm system is proposed. The general component of the automation system is first introduced. The mathematical model and the corresponding transfer functions of a DC motor in the robotic arm system are presented.  The investigations of using DC motor in the robotic arm system without controller lead to poor system performance. Therefore, the analysis and design of a Proportional plus Integration plus Divertive (PID) controller is illustrated.

... Show More
View Publication
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Electric Power Systems Research
Electromagnetic transient modeling of form-wound stator coils with stress grading system under PWM excitation
...Show More Authors

The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the

... Show More
Crossref (5)
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Cogent Engineering
IEC 60909 and ANSI standards comparison with ASCC based fault calculations of Iraqi power system
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Sep 30 2015
Journal Name
College Of Islamic Sciences
The other day in the Holy Quran and the four Gospels: A comparative study
...Show More Authors

The other day in the Holy Quran and the four Gospels

View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
Translation & Linguistics
TO THE QUESTION ABOUT THE USE OF METAPHORS IN THE CREATION OF ART (ON THE EXAMPLE OF THE STORY BY D. RUBINA "YOU AND ME UNDER THE PEACH CLOUDS")
...Show More Authors

The article reflects the results of the analysis of the use of metaphors when creating the image of the main character of the story by D. Rubina "You and me under the peach clouds" - a pet, a dog named Kondraty. Through metaphorization, the image of the dog is filled by the author with purely human qualities, thus passing into the category of a full member of the family. The article is a continuation of the study of the work of D. I. Rubina.

Publication Date
Thu Feb 19 2026
Journal Name
Journal Of Physical Education
The Effect of Special Exercises Using Handball R.T On Motor Response Development and Some Goalkeeping Skills For Handball Players from the National Center for Gifted In Handball Aged (15 – 16) Years Old
...Show More Authors

View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Evaluating the supervision tools of the Central Bank of Iraq to verify the continuity of private banks: An applied research in the Central Bank of Iraq
...Show More Authors

The aim of the research to highlight the calendar of the most important tools used by the Central Bank of Iraq, in the implementation of the function of supervisory oversight, to verify the stability of the banking system, and protect the funds of shareholders, and depositors in general and the absence of any raises the risks of default and financial failure in particular, for commercial banks. The most important flaws and weaknesses in these tools, in the early detection of the risks of continuity in a timely manner, The study concluded a set of conclusions, including the weakness of the tools used in the performance of the function of supervisory oversight in detecting cases of default and financial failure in the early time as well as

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Strategic Management Accounting Techniques on the Reliability of Financial Statements:: The Impact of Strategic Management Accounting Techniques on the Reliability of Financial Statements:
...Show More Authors

The objective that the researcher seeks to achieve through this research is to clarify the relationship between strategic management accounting techniques and the reliability of financial statements, and to measure the impact of these techniques as an independent variable with its three dimensions, which are: activities-based cost, target cost, and benchmarking on the reliability of financial statements as a dependent variable. To achieve this objective, the researcher did the following: First: Determine the research problem through the following question: Do strategic management accounting techniques affect the reliability of financial statements in industrial companies listed on the Palestine Exchange? Second: Making the analytical des

... Show More
View Publication Preview PDF