In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.
Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele
... Show MoreAn experiment was carried out at Al-Raed Research Station, which is located on the Baghdad-Anbar road during the winter season, in order to study the effect of the type of solar panels and irrigation system on some performance indicators of irrigation systems and germination percentage of bean crop (Vicia Faba L). A randomized complete block design (RCBD) was used with three replications. The experiment consist of two factors. 1st factor was the solar panel type with two levels : monocrystalline and polycrystalline. Second factor was the irrigation system with two levels Drip and sprinkler irrigation system the following indicators were studied : solar panel efficiency (%), Irrigation
Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor
... Show More60 patients diagnosed as having urticaria were included in the study ; 30 patients were effected with acute urticaria and 30 patients were affected with chronic urticaria. In addition, 30 healthy adult volunteers were selected as control group .The patients and control groups sera were examined with enzyme linked immunosorbent assay ( ELISA) to detect total level IgE and radial immunodiffusion (RID) to detect levels of IgG , IgA and IgM . The total level of IgE in acute urticaria ( 1.45±0.13) IU/mL and chronic urticaria (2.12 ± 0.10) IU/mL patients were significantly higher than the control groups ( 0.85 ± 0.10)IU/mL (p<0.05). The level of IgG in acute urticaria ( 12.5± 0.42) g/L and chronic (13.16±0.40) g/L patients , IgA in acute (2.
... Show MorePermeability estimation is a vital step in reservoir engineering due to its effect on reservoir's characterization, planning for perforations, and economic efficiency of the reservoirs. The core and well-logging data are the main sources of permeability measuring and calculating respectively. There are multiple methods to predict permeability such as classic, empirical, and geostatistical methods. In this research, two statistical approaches have been applied and compared for permeability prediction: Multiple Linear Regression and Random Forest, given the (M) reservoir interval in the (BH) Oil Field in the northern part of Iraq. The dataset was separated into two subsets: Training and Testing in order to cross-validate the accuracy
... Show MoreAn experiment was conducted to study the effect of the sprayer type according to the source of power and the size of the spray nozzle concerning the quality of the spray produced and fuel consumption.Two types of sprayers were used: a conventional boom sprayer (S1) and a modified (electrified) boom sprayer (S2), along with three sizes of the XR TeeJet 110 spray nozzle (N). The following technical performance indicators were examined: Density of coverage (drops/cm2) using ImageJ software, a 600dpi business card scanner, specifically the ScanShell 800N by CSSN, Inc, and water-sensitive paper (WSP), rate of spray nozzles discharge (ml/min), and fuel consumption (liters/hectare) using a c
In this paper, we consider inequalities in which the function is an element of n-th partially order space. Local and Global uniqueness theorem of solutions of the n-the order Partial differential equation Obtained which are applications of Gronwall's inequalities.
An investigation of the quadrupole deformation of Kr, Sr, Zr, and Mo isotopes has been conducted using the HFB method and SLy4 Skyrme parameterization. The primary role of occupancy of single particle state 2d5/2 in the existence of the weakly bound structure around N=50 is probed. Shell gaps are performed using a few other calculations for the doubly magic number 100Sn using different Skyrme parameterizations. We explore the interplays among neutron pairing strength and neutron density profile in two dimensions, along with the deformations of 100Sn.