Preferred Language
Articles
/
bsj-7959
A Comparison between Ericson's Formulae Results and Experimental Data Using New Formulae of Single Particle Level Density
...Show More Authors

The partial level density PLD of pre-equilibrium reactions that are described by Ericson’s formula has been studied using different formulae of single particle level density . The parameter  was used from the equidistant spacing model (ESM) model and the non- equidistant spacing model (non-ESM) and another formula of  are derived from the relation between  and level density parameter . The formulae used to derive  are the Roher formula, Egidy formula, Yukawa formula, and Thomas –Fermi formula. The partial level density results that depend on  from the Thomas-Fermi formula show a good agreement with the experimental data.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Relationship between federal budget estimates And actual implementation
...Show More Authors

he public federal budget of the state includes estimated figures for state revenues and expenditures for the next fiscal year. The estimation process is one of the main parts of the preparation of the general budget of the state and the accuracy in the estimation of revenues and expenditures of the most important principles that should be based on the process of making estimates and should not overestimate the assessment process to ensure the availability of funds in the future in all cases, which lead to unfair distribution of allocations, so the research aims to study The case of preparing the budget in the Directorate and how to estimate the expenditure in, by the analysis of operating budgets and identify deviations in the implementa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Further Results on (a, d) -total Edge Irregularity Strength of Graphs
...Show More Authors

Consider a simple graph   on vertices and edges together with a total  labeling . Then ρ is called total edge irregular labeling if there exists a one-to-one correspondence, say  defined by  for all  where  Also, the value  is said to be the edge weight of . The total edge irregularity strength of the graph G is indicated by  and is the least  for which G admits   edge irregular h-labeling.  In this article,   for some common graph families are examined. In addition, an open problem is solved affirmatively.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
An Estimated Answer of a Condition between the Interpretive Structure and Surface Structure: Al-Qurtubi’s Tafseer as a Model: عمر عقلة خليف الدعجة
...Show More Authors

This present work is concerned with one of the syntactic issues that has been researched by many linguists, grammarians, and specialists in Islamic studies, the estimated answer to a condition. However, this topic is researched this time by examining Imam Al-Qurtbi’s opinions in interpreting related ayas from the holly Quraan in his book (Collector of Quranic Rules) or its transliteration (Al-Jami’ Li Ahkam Al-Quran). Such a step involves commenting on, tracking what Al-Qurtbi said in this regard, discussing it from the points of view of other grammarians, and judging  it accordingly, taking into account the apparent surface structures of the examples collected. To achieve this objective, the inductive analytical approach has be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
New Robust Estimation in Compound Exponential Weibull-Poisson Distribution for both contaminated and non-contaminated Data
...Show More Authors

Abstract

The research Compared two methods for estimating fourparametersof the compound exponential Weibull - Poisson distribution which are the maximum likelihood method and the Downhill Simplex algorithm. Depending on two data cases, the first one assumed the original data (Non-polluting), while the second one assumeddata contamination. Simulation experimentswere conducted for different sample sizes and initial values of parameters and under different levels of contamination. Downhill Simplex algorithm was found to be the best method for in the estimation of the parameters, the probability function and the reliability function of the compound distribution in cases of natural and contaminateddata.

 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 05 2024
Journal Name
Al-academy
Problematic theatrical landscape design Between the director and designer
...Show More Authors

This research discussed analytically based on intellectual institutions and theoretical landscape theater as artistic phenomenon depends on the compounds interacting overlapping mechanism visualization and dazzling Whatever the dilemma it a set of Alaqcar differ among themselves but in the result unit intellectual holds through difference and diversity between trends and styles and ways in design theorist theatrics Valashkalah on apparently formed through variations and different points of view through the philosophy of transformation and interpretation and assignment to offer privacy.
Valashkalah pulled in the design theorist theatrical as system training to arrange time and place and in line with the interpretation of speech text an

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 03 2018
Journal Name
Al-academy
Typographic Accomplishment between the Manual Skill and Contemporary Technology
...Show More Authors

     The typographic accomplishment is the most important means of cognitive communication and carries a message from the sender to the recipient which serves a certain objective functionally, economically and advertisingly.

            The design of typographic accomplishment depends on two different techniques, the first is manual, which depends on the skill, training and individual achievement of the designer and his ability to design and produce typographic accomplishment with manual skill effects. The second one is the contemporary digitization which is represented by computers, programs and printers attached to them. The problem of the current resear

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 10 2009
Journal Name
مجلة كلية اللغات
relative pronoun in Hebrew language between ancient and modern
...Show More Authors

Abstract The relative pronoun in Hebrew language is an important pronoun use anciently and recently, it developed and it's usage and meanings differed so, it was not confined to the particle "אֲשֶׁר" as a relative pronoun, but beside it appeared other pronouns giving the relative meaning. Hence, the topic of this research was on this basis through studying the relative pronouns in old and modern Hebrew, the way of using them and their connection with preposition particles, as well as studying the relative clause.

Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Proposition of New Ensemble Data-Intelligence Models for Surface Water Quality Prediction
...Show More Authors

View Publication
Scopus (68)
Crossref (58)
Scopus Clarivate Crossref