Preferred Language
Articles
/
gxcdUZABVTCNdQwC3obR
GAMMA RAY PROPERTIES FROM70As NUCLEUS
...Show More Authors

Multipole mixing ratios for gamma transition populated in from reaction have been studied by least square fitting method also transition strength ] for pure gamma transitions have been calculated taking into account the mean life time for these levels .

Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Double Stage Shrinkage-Bayesian Estimator for the Scale Parameter of Exponential Distribution
...Show More Authors

  This paper is concerned with Double Stage Shrinkage Bayesian (DSSB) Estimator for lowering the mean squared error of classical estimator ˆ q for the scale parameter (q) of an exponential distribution in a region (R) around available prior knowledge (q0) about the actual value (q) as initial estimate as well as to reduce the cost of experimentations.         In situation where the experimentations are time consuming or very costly, a Double Stage procedure can be used to reduce the expected sample size needed to obtain the estimator. This estimator is shown to have smaller mean squared error for certain choice of the shrinkage weight factor y( ) and for acceptance region R. Expression for

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 03 2025
Journal Name
Engineering, Technology & Applied Science Research
Application of the One-Step Second-Derivative Method for Solving the Transient Distribution in Markov Chain
...Show More Authors

Markov chains are an application of stochastic models in operation research, helping the analysis and optimization of processes with random events and transitions. The method that will be deployed to obtain the transient solution to a Markov chain problem is an important part of this process. The present paper introduces a novel Ordinary Differential Equation (ODE) approach to solve the Markov chain problem. The probability distribution of a continuous-time Markov chain with an infinitesimal generator at a given time is considered, which is a resulting solution of the Chapman-Kolmogorov differential equation. This study presents a one-step second-derivative method with better accuracy in solving the first-order Initial Value Problem

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Journal Of Engineering
Finite Element Investigation on Shear Lag in Composite Concrete-Steel Beams with Web Openings
...Show More Authors

In this paper, effective slab width for the composite beams is investigated with special emphasis on the effect of web openings. A three dimensional finite element analysis, by using finite element code ANSYS, is employed to investigate shear lag phenomenon and the resulting effective slab width adopted in the classical T-beam approach. According to case studies and comparison with limitations and rules stipulated by different standards and codes of practice it is found that web openings presence and panel proportion are the most critical factors affecting effective slab width, whereas concrete slab thickness and steel beam depth are less significant. The presence of web opening reduces effective slab width by about 21%.

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 08 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Studying Hueckel Edge Detector Using Binary Step Edge Image
...Show More Authors

Hueckel edge detector study using binary step edge image is presented. The standard algorithm that Hueckel presented, in his paper without any alteration is adopted. This paper studies a fully analysis for the algorithm efficiency, time consuming and the expected results with slide window size and edge direction. An analysis for its behavior with the changing of the slide window size (disk size) is presented. The best result is acquired when the window size equals to four pixel.  

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Sep 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Using simulation to estimate parameters and reliability function for extreme value distribution
...Show More Authors

   This study includes Estimating scale parameter, location parameter  and reliability function  for Extreme Value (EXV) distribution by two methods, namely: -
- Maximum Likelihood Method (MLE).
- Probability Weighted Moments Method (PWM).

 Used simulations to generate the required samples to estimate the parameters and reliability function of different sizes(n=10,25,50,100) , and give real values for the parameters are and , replicate the simulation experiments (RP=1000)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering
A Study of Fluctuation and Expansion Ratios for Gas-Solid Fluidized Columns
...Show More Authors

The fluctuation and expansion ratios have been studied for cylindrical gas-solid fluidized columns by using air as fluidizing medium and Paracetamol as the bed material. The variables were the column diameter (0.0762, 0.15, and 0.18 m), static bed height (0.05, 0.07, and 0.09 m), and air velocity to several times of minimum fluidization velocity. The results showed that both the fluctuation and expansion ratios had a direct relation with air velocity and an inverse one with column diameter and static bed height. A good agreement was between the experimental results and the calculated values by using the correlation equations from the literature.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Analytical Study of Bending Stresses and Deflections in Curved Beam Made of Laminated Composite Material
...Show More Authors

Abstract

 

Theoretical and experimental methodologies were assessed to test curved beam made of layered   composite material. The maximum stress and maximum deflection were computed for each layer and the effect of radius of curvature and curve shape on them. Because of the increase of the use of composite materials in aircraft structures and the renewed interest in these types of problems, the presented theoretical assessment was made using three different approaches: curved beam theory and an approximate 2D strength of material equations and finite element method (FEM) analysis by ANSYS 14.5 program for twelve cases of multi-layered cylindrical shell panel differs in fibe

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and Characterization of FeІІ , CoІІ , NiІІ , CuІІ and ZnІІ Complexes With Dithiocarbamate and N-Donor Ligands
...Show More Authors

New complexes of first series of transition metals with P-amino benzene dithiocarbamate of the general formula [M(PABdtc)2] and [ M(PABdtc)2(L)n] M=Fe( ІІ ),Co( ІІ ),Ni( ІІ ) ,Cu(ІІ) and Zn (ІІ). PABdtc = Paraamino benzene dithiocarbamate ,n=2 when  L= Py,É£-Pic,iso qunoline ,3,5lutidine  n=1when L=1,10-phenanthroline, en, 2,-2bipy.and the type(R)4N[Ni(PABdtc)3] R= methyl, ethyl are prepared. Physico chemical characterization of these complexes was applied  using magnetic susceptibility measurements, molar conductance , Infrared and electronic spectra, Metal content measurements, molar conductance indicate complexes of the type [M(PABdtc)2] and [M(PABdtc)2(L)n] are non-electrolyte

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 17 2011
Journal Name
مجلة كلية التربية
Synthesis and Characterization of Complexes of [(N,N- -Bis(2- Hydroxy Ethyl) Glycine] with Some Metal Salts
...Show More Authors

Some transition metal ions (Cr +3, Co+2 , Ni+2,Cu+2, Zn+2,Ag + ,Cd+2 ) complexes of [(N, N- - Bis(2- hydroxy ethyl) Glycine] (Bicine) have been synthesized and characterized by FTIR ,UV-Visble spectroscopy, atomic absorption, magnetic susceptibility, conductivity measurements and study of the nature of the complexes formed in ethanolic solution following the moleratio method. From the results obtained the following general formola have been given for the prepared complexes [M m+ (Bicine)n]. XH2O