Preferred Language
Articles
/
jeasiq-1046
Notes on Weibull Distribution
...Show More Authors

Weibull Distribution is one of most important distribution and it is mainly used in reliability and in distribution of life time. The study handled two parameter and three-parameter Weibull Distribution in addition to five –parameter Bi-Weibull distribution. The latter being very new and was not mentioned before in many of the previous references. This distribution depends on both the two parameter and the three –parameter Weibull distributions by using the scale parameter (α) and the shape parameter (b) in the first and adding the location parameter (g)to the second and then joining them together to produce a distribution with five parameters.

The paper also handled the relationship between Weibull Distribution and the other known distributions such as the exponential distribution, Chi distribution, Gamma distribution and Gumbel (extreme value) distribution.

The paper  considered a number of important notes including the importance and the application of Weibull distribution in the field of reliability.

The study depended on the most recent research papers on this subject and until May 2004.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
الوجود الفلسطیني في لبنان وانعكاسات الازمة الفلسطینیة على الوضع اللبناني: الوجود الفلسطیني في لبنان وانعكاسات الازمة الفلسطینیة على الوضع اللبناني
...Show More Authors

Abstract:
The Palestinian existence in Lebanan is regard as active Arab powers
in political system in Lebanan. This existence arises exactly in Lebanan on 5 /
June / 1967. The Palestinians distributed from south to north, from Bayrouth

to Al-Bquaa, also they lived in Camps like (Tal Al-Zater), (Aen Al-hlwa, Mya –
Mya) and so on.
The armed Palestinian resistance breakout from these camps in
Lebanan against Israel, Lebanon rejected this conflict to avoid any
confrontation with Israel which have big military and high ability in different
aspects in addition security of Lebanan did not connected with security of
Arab states in other side the civil war which break out in Lebanon impact upon
Palestinians

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Unipolarity and Its Influences in American Foreign Policy and the Future International Relations: Unipolarity and Its Influences in American Foreign Policy and the Future International Relations
...Show More Authors

Abstract
The concept of unipolar has allowed the united states of America to
control the rest of the internations community units through the rxclusively of
control in international affairs without enabling other countries who have the
ability to compete with it to appear this comes as a result of it's position to all
kinds of powers like military, economic and technical powers that enable it to
continue dominating other countries, this superior control enabled it to be the
(hyper power) on the international political scene so that it allowed it to
exercise and implement the policy of domination against all this appeared
after its empire superiority became clear, in a unique way that have never
been known in

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 19 2004
Journal Name
Association Of Arab Universities Journal Of Engineering
تأثير وجود المحرمات على تنامي الفشل في المنحدرات
...Show More Authors

Publication Date
Thu Jan 23 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
أنعكاسات عمليات التجارة الالكترونية على هيكل الرقابة الداخلية
...Show More Authors

With the growing use of electronic commerce has worked many companies, especially public shareholding to take advantage of them treated in the trade, so that the e-commerce part of the corporate environment, and this has made a career of accounting and auditing facing new challenges to the sophistication of the information and the rapid growth in the market for electronic commerce. And raised many questions about the ability of the audit profession to facing these challenges and how to audit operations of e-commerce and how to give confidence on websites, this sense it has become necessary keep the internal control systems of this technology and what has caused changes to the accounting system, and evolve to fit the developments that hav

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Clarivate Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Body parts idioms; across-cultural significance
...Show More Authors

0

View Publication Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Sun Oct 04 2009
Journal Name
Journal Of Educational And Psychological Researches
اثار العولمة الاقتصادية على البيئة والإنسان في العراق
...Show More Authors

مشكلة البحث واهميته:-

          اخذ موضوع العولمة قدراً وافياً من الاهتمام سواء على المستوى الاكاديمي او على مستوى اجهزة الاعلام والرأي العام ومختلف التيارات السياسية والاقتصادية والاجتماعية ، فلا يخلو أي لقاء اقتصادي او سياسي او اجتماعي من الحديث عن العولمة اذ نشرت العديد من الابحاث والدراسات وعقدت الكثير من الندوات والمؤتمرات لدراسة العولمة وبيان اثارها ولعل ذل

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
International and Regional Competition for the African Coast
...Show More Authors

This study aimed at analyzing and studying the strategic and geopolitical importance of the Sahel region, which increased the regional competition for the resources of the region, especially the energy resources that have been and continue to be one of the axes of conflict and competition between these forces.
The researcher tried to review the competition between the international force, France, the United States of America, China, Algeria and Libya, and the African coast. We note that there is a positive correlation between the severity of the conflict and the intensity of the competition of the major powers to control the countries of the region and the extent of political and economic stability These countries are directly affecte

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Quotient Energy of Zero Divisor Graphs And Identity Graphs
...Show More Authors

Consider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph  make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs  of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs  derived from the group  and a few classes of zero-divisor graphs  of the commutative ring R are examined.

View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref