Preferred Language
Articles
/
bsj-1372
On The Queuing System M/Er/1/N
...Show More Authors

In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Correlation of Insulin Like Growth Factor-1 and Insulin-Like Growth Factor Binding Protein with LH, FSH and Testosterone in Iraqi Children with Growth Hormone Deficiency
...Show More Authors

Insulin like growth factor-1 has metabolic and growth-related roles all over the body and is strongly associated and regulated by growth hormone. It is produced by almost any type of tissue, especially the liver. The study aimed to measure insulin like growth factor in growth hormone deficient patients and find its relation with other studied parameters. The Subjects in the study were 180 studied in the National Diabetic Center for Treatment and Research/Al-Mustansiriya University in Baghdad/Iraq for the period from November 2021 to April 2022. Blood was drawn and investigated for the levels of IGF-1, IGFBP-3, LH, and FSH. Also testosterone and statistical analysis was carried out to find the potential correlations. The results relived t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Molecular Structure
Synthesis, spectral studies, DFT, biological evaluation, molecular docking and dyeing performance of 1-(4-((2-amino-5-methoxy)diazenyl)phenyl) ethanone complexes with some metallic ions
...Show More Authors

Four Co(II), (C1); Ni(II), (C2); Cu(II), (C3) and Zn(II), (C4) chelates have been synthesized with 1-(4-((2-amino- 5‑methoxy)diazenyl)phenyl)ethanone ligand (L). The produced compounds have been identified by using spectral studies, elemental analysis (C.H.N.O), conductivity and magnetic properties. The produced metal chelates were studied using molar ratio as well as sequences contrast types. Rate of concentration (1 ×10􀀀 4 - 3 ×10􀀀 4 Mol/L) sequence Beer’s law. Compound solutions have been noticed height molar absorptivity. The free of ligand and metal chelates had been applied as disperse dyes on cotton fabrics. Furthermore, the antibacterial activity of the produced compounds against various bacteria had been investigated. F

... Show More
View Publication
Scopus (60)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Molecular Structure
Synthesis, spectral studies, DFT, biological evaluation, molecular docking and dyeing performance of 1-(4-((2-amino-5-methoxy)diazenyl)phenyl) ethanone complexes with some metallic ions
...Show More Authors

Scopus (60)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE ROLE OF MARKETING MIX AND INNOVATION ON SERVICE DESIGN EXPLORATORY RESEARCH AT COMPANY KOREK TELECOM.: THE ROLE OF MARKETING MIX AND INNOVATION ON SERVICE DESIGN EXPLORATORY RESEARCH AT COMPANY KOREK TELECOM.
...Show More Authors

The success of the company's strategy depends to a large extent on the success of its functional areas, the marketing Mix makes the company more able to monitor the external environment and the rapid changes related to competitors and customers, as well as the innovation contributes to meet the needs of customers and the requirements of competition and try to find solutions to various problems in Innovation ways, and thus integrated marketing and Innovation efforts in the company towards the design of competitive services to meet the requirements of customers and competition. The research aims to determine how marketing Mix and innovation to design unique and distinct services compared to the competitors, through exporator a sample of en

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The effect of increasing the volume of debt on the volume of trading (applied research on a sample of private banks listed on the Iraq Stock Exchange)
...Show More Authors

 

This research worked on identifying the effect of increasing the volume of indebtedness by companies listed on the Iraq Stock Exchange on the trading volume of those companies, and this research included some theoretical concepts related to both debt financing and trading volume, and it represents the research community of the joint-stock companies listed in The Iraq Stock Exchange (the banking sector). As for the research sample, it was deliberately chosen represented by companies with continuous trading without stopping, which reached 10 joint-stock companies, and the period of research was extended during the period 2011-2015, and a set of indicators and financial methods were used In measuring research v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Proceedings Of The International Conference On Research Advances In Engineering And Technology - Itechcet 2022
Suitability of Iraqi legal system for building operation transfer contract in infrastructure construction projects
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed May 15 2019
Journal Name
Al-khwarizmi Engineering Journal
Mesoporous Silica MCM-41 as a Carriers Material for Nystatine Drug in Delivery System
...Show More Authors

In the present study, MCM-41 was synthesis as a carrier for poorly drugs soluble in water, by the sol-gel technique. Textural and chemical characterizations of MCM-41 were carried out by X-ray diffraction (XRD), Fourier transform infrared (FTIR), scanning electron microscope (SEM), and thermal gravimetric analysis (TGA). The experimental results were analyzed mesoporous carriers MCM-41. With maximum drug loading efficiency in MCM-41 determined to be 90.74%. The NYS released was prudently studied in simulated body fluid (SBF) pH 7.4 and the results proved that the release of NYS from MCM-41 was (87.79%) after 18 hr. The data of NYS released was found to be submitted a Weibull model with a correlation coefficient of (0.995). The Historical

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Building a Reliable Steganography System Using Random Key in a spatial Domain of Image
...Show More Authors

With time progress importance of hiding information become more and more and all steganography applications is like computer games between hiding and extracting data, or like thieves and police men always thieve hides from police men in different ways to keep him out of prison. The sender always hides information in new way in order not to be understood by the attackers and only the authorized receiver can open the hiding message. This paper explores our proposed random method in detail, how chooses locations of pixel in randomly , how to choose a random bit to hide information in the chosen pixel, how it different from other approaches, how applying information hiding criteria on the proposed project, and attempts to test out in code, and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref