Preferred Language
Articles
/
ijs-5923
Generalized Pre α-Regular and Generalized Pre α-Normal Spaces in Topological Spaces
...Show More Authors

     The concept of separation axioms constitutes a key role in general topology and all generalized forms of topologies. The present authors continued the study of gpα-closed sets by utilizing this concept, new separation axioms, namely gpα-regular and gpα-normal spaces are studied and established their characterizations. Also, new spaces namely gpα-Tk  for k = 0, 1, 2 are studied.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Different Estimation Methods for System Reliability Multi-Components model: Exponentiated Weibull Distribution
...Show More Authors

        In this paper, estimation of system reliability of the multi-components in stress-strength model R(s,k) is considered, when the stress and strength are independent random variables and follows the Exponentiated Weibull Distribution (EWD) with known first shape parameter θ and, the second shape parameter α is unknown using different estimation methods. Comparisons among the proposed estimators through  Monte Carlo simulation technique were made depend on mean squared error (MSE)  criteria

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
On A Class of W-Valent Functions With Two Fixed Points Involving Hypergeomatric Function with Generalization Integral Operator
...Show More Authors

In this paper we have studied a generalization of  a class of ( w-valent ) functions with two fixed points involving hypergeometric function with generalization  integral operator . We obtain some results like, coefficient estimates and some theorems of this class.

View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Some Applications of Quasi-Subordination for Bi-Univalent Functions Using Jackson’s Convolution Operator
...Show More Authors

     In this paper, subclasses of  the function class  ∑  of analytic and bi-univalent functions associated with operator  L_q^(k,  λ)  are introduced and defined in the open unit disk △ by applying quasi-subordination. We obtain some results about the corresponding bound estimations of the coefficients  a_(2 )  and a_(3 ).

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jun 30 2008
Journal Name
Iraqi Journal Of Science
On the Greedy Ridge Function Neural Networks for Approximation Multidimensional Functions
...Show More Authors

The aim of this paper is to approximate multidimensional functions f∈C(R^s) by developing a new type of Feedforward neural networks (FFNS) which we called it Greedy ridge function neural networks (GRGFNNS). Also, we introduce a modification to the greedy algorithm which is used to train the greedy ridge function neural networks. An error bound are introduced in Sobolov space. Finally, a comparison was made between the three algorithms (modified greedy algorithm, Backpropagation algorithm and the result in [1]).

Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Estimate the Best production function of the General Company for Iraqi Cement for the period (1996-2010)
...Show More Authors

     The General Company for Iraqi Cement is regarded as one of the companies that contribute to support the Iraqi economy. It contributes to provide the material of cement which fulfils the consumer and investment need in the markets in competitive prices and not to resort to the importing of the cement from abroad. That would save a great share of the purchase parity of the poor sectors of society. The estimation  of production function will contribute to putting the company.

The application functions of  the standard production of  benefit critical to clarify the actual relationship between production & its components, & allow to clarify the i

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
A Study on the Bases of Space of Vector Valued Entire Multiple Dirichlet Series
...Show More Authors

Let 


 
, 1
( )
1 2 ,
( , ) 1 2
m n
s s
m n
f s s a e m n   , (s   it , j 1,2) j j j  ,  
m 1  and
 
n 1  being an increasing sequences of positive numbers and a E m n  , where E
is Banach algebra, represent a vector valued entire Dirichlet functions in two
variables. The space  of all such entire functions having order at most equal to 
is considered in this paper. A metric topology using the growth parameters of f is
defined on  and its various properties are obtained. The form of linear operator on
the space  is characterized and proper bases are also characterized in terms of
growth parameters  .

View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Evaluation the reactions of production the radioactive Iodine-124
...Show More Authors

Nowadays, the field of radionuclide treatment is enjoying an exciting stage and preparing for further growth and progress in the future. For instance, in Asia, the large spread of liver and thyroid diseases has resulted in several new developments/clinical trials using molecular radiotherapy (i.e. targeted radionuclide therapy). Iodine-124 has unique physical properties including long half-life that adding an advantage for pharmacokinetics and radiopharmaceutical analysis. One of its applications in nuclear medicine is in Positron Emission Tomography (PET).

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Oct 22 2023
Journal Name
Iraqi Journal Of Science
Characteristics of Electrical Power Generation by Wind for Al-Tweitha Location Using Weibull Distribution Function
...Show More Authors

In this paper, the 5 minutes measured wind speed data for year 2012 at 10 meter height for Tweitha have been statically analyzed to assess the time of wind turbine electrical power generation. After collection Tweitha wind data and calculation of mean wind speed the cumulative Weibull diagram and probability density function was ploted, then each of cumulative Weibull distribution, cut-in and furling turbine wind speed could be used as a mathematical input parameters in order to estimate the hours of electrical power generation for wind turbine during one day or one year. In Tweitha site, found that the average wind speed was (v= 1.76 m/s), so five different wind turbines were be selected to calculate hours of electrical generation for A

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Numerical Solution of Mixed Volterra – Fredholm Integral Equation Using the Collocation Method
...Show More Authors

Volterra Fredholm integral equations (VFIEs) have a massive interest from researchers recently. The current study suggests a collocation method for the mixed Volterra - Fredholm integral equations (MVFIEs)."A point interpolation collocation method is considered by combining the radial and polynomial basis functions using collocation points". The main purpose of the radial and polynomial basis functions is to overcome the singularity that could associate with the collocation methods. The obtained interpolation function passes through all Scattered Point in a domain and therefore, the Delta function property is the shape of the functions. The exact solution of selective solutions was compared with the results obtained

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (3)
Scopus Clarivate Crossref