Preferred Language
Articles
/
bsj-2835
Linear Increasing in Radial Electronic Density Distribution for K and L Shells throughout Some Be-Like Ions
...Show More Authors

Maximum values of one particle radial electronic density distribution has been calculated by using Hartree-Fock (HF)wave function with data published by[A. Sarsa et al. Atomic Data and Nuclear Data Tables 88 (2004) 163–202] for K and L shells for some Be-like ions. The Results confirm that there is a linear behavior restricted the increasing of maximum points of one particle radial electronic density distribution for K and L shells throughout some Be-like ions. This linear behavior can be described by using the nth term formula of arithmetic sequence, that can be used to calculate the maximum radial electronic density distribution for any ion within Be like ions for Z<20.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
A Mathematical Approach for Computing the Linear Equivalence of a Periodic Key-Stream Sequence Using Fourier Transform
...Show More Authors

A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Employ Stress-Strength Reliability Technique in Case the Inverse Chen Distribution
...Show More Authors

This paper uses classical and shrinkage estimators to estimate the system reliability (R) in the stress-strength model when the stress and strength follow the Inverse Chen distribution (ICD). The comparisons of the proposed estimators have been presented using a simulation that depends on the mean squared error (MSE) criteria.

 

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Estimation of P(Y<X) in Case Inverse Kumaraswamy Distribution
...Show More Authors

The estimation of the stressÙ€ strength reliability of Invers Kumaraswamy distribution will be introduced in this paper based on the maximum likelihood, moment and shrinkage methods. The mean squared error has been used to compare among proposed estimators. Also a Monte Carlo simulation study is conducted to investigate the performance of the proposed methods in this paper.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Quality assurance of the linear accelerator device using Star Track and Perspex
...Show More Authors

In this study, the quality assurance of the linear accelerator available at the Baghdad Center for Radiation Therapy and Nuclear Medicine was verified using Star Track and Perspex. The study was established from August to December 2018. This study showed that there was an acceptable variation in the dose output of the linear accelerator. This variation was ±2% and it was within the permissible range according to the recommendations of the manufacturer of the accelerator (Elkta).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Constructing and Solving the System of Linear Equations Produced From LFSR Generators
...Show More Authors

 

Linear Feedback Shift Register (LFSR) systems are used  widely in stream cipher systems field. Any system of LFSR's which wauldn't be attacked must first construct the system of linear equations of the LFSR unit. In this paper methods are developed to construct a system of linear/nonlinear equations of key generator (a LFSR's system) where the effect of combining (Boolean) function of LFSR is obvious. Before solving the system of linear/nonlinear equations by using one of the known classical methods, we have to test the uniqueness of the solution. Finding the solution to these systems mean finding the initial values of the LFSR's of the generator. Two known generators are used to test and apply the ideas of the paper,

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Science
Oscillation and Asymptotic Behavior of Second Order Half Linear Neutral Dynamic Equations
...Show More Authors

     The oscillation property of the second order half linear dynamic equation was studied, some sufficient conditions were obtained to ensure the oscillation of all solutions of the equation. The results are supported by illustrative examples.

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Fundamental graduation of man-made provisions in the jurisprudence of the companion Abdullah bin Amr, may God be pleased with them
...Show More Authors

In The Name of Allah Most Gracious Most Merciful

The fundamentals of jurisprudence have a great role in facilitating the ways to know the Shari’a rulings for everything that takes place between people in terms of relationships, and the actions that are issued by them, because without it, the sources from which the rulings were taken are not known, and the methods used by the imams of ijtihad in taking these rulings from those sources are not understood. The foundations on which they followed in the interpretation of texts and its rules, and Muslim scholars in different eras celebrated this science and gave it great care: with what they wrote in it from the works of different directions, but of course the complexity printed many

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 25 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparison of the Suggested loss Function with Generalized Loss Function for One Parameter Inverse Rayleigh Distribution
...Show More Authors

The experiences in the life are considered important for many fields, such as industry, medical and others. In literature, researchers are focused on flexible lifetime distribution.

In this paper, some Bayesian estimators for the unknown scale parameter  of Inverse Rayleigh Distribution have been obtained, of different two loss functions, represented by Suggested and Generalized loss function based on Non-Informative prior using Jeffery's and informative prior represented by Exponential distribution. The performance of   estimators is compared empirically with Maximum Likelihood estimator, Using Monte Carlo Simulation depending on the Mean Square Error (MSE). Generally, the preference of Bayesian method of Suggeste

... Show More
View Publication Preview PDF
Publication Date
Wed Oct 02 2013
Journal Name
Journal Of The College Of Basic Education
Excess parameters of binary mixtures of tetrahydrofurfuryl alcohol with cyclopentanol and 1-pentanol at (293.15, 303.15 and 313.15 K)
...Show More Authors

Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Crossref