Preferred Language
Articles
/
jeasiq-1087
Notes on Weibull Distribution
...Show More Authors

Weibull Distribution is one of most important distribution and it is mainly used in reliability and in distribution of life time. The study handled two parameter and three-parameter Weibull Distribution in addition to five –parameter Bi-Weibull distribution. The latter being very new and was not mentioned before in many of the previous references. This distribution depends on both the two parameter and the three –parameter Weibull distributions by using the scale parameter (α) and the shape parameter (b) in the first and adding the location parameter (g)to the second and then joining them together to produce a distribution with five parameters.

The paper also handled the relationship between Weibull Distribution and the other known distributions such as the exponential distribution, Chi distribution, Gamma distribution and Gumbel (extreme value) distribution.

The paper  considered a number of important notes including the importance and the application of Weibull distribution in the field of reliability.

The study depended on the most recent research papers on this subject and until May 2004.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
العلاقة السببية بين منهج التخطيط والتنمية – بحث تحليلي للتجربة الماليزية –
...Show More Authors

 ٳن العلاقة بين التخطيط والتنمية، تكتسب᾽ شكلها وطبيعتها من خلال دور التخطيط في ٳخضاع عملية التغيير والتحوّل للأوضاع الاقتصادية من وضع الى وضع آخر أكثر تقدما̋ عن طريق ٳعتماد منهج التخطيط لتحديد معالم خطوط السير المجدول زمنيا̋ لعملية التغيير والتحوّل وفقا̋ لرؤية الحكومة وفلسفتها باتجاه الانتقال من وضع ٳقتصادي وٳجتماعي متخلف الى وضع ٳقتصادي وٳجتماعي آخر يسمح بجعل عملية النمو مستمرة، ويمكن تبيّن تلك

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Eatimation Availability Function Through Determination The Optimal Imperfect Preventive Maintenance Period By using Simulation
...Show More Authors

This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.

According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability

p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive

preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the

average durations of the preventive and corrective maintenance actions a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Fusion Reaction Study of some Selected Halo Systems
...Show More Authors

The challenge in studying fusion reaction when the projectile is neutron or proton rich halo nuclei is the coupling mechanism between the elastic and the breakup channel, therefore the motivation from the present calculations is to estimate the best coupling parameter to introduce the effect of coupled-channels for the calculations of the total cross section of the fusion  , the barrier distribution of the fusion   and the average angular momentum ⟨L⟩ for the systems 6He+206Pb, 8B+28Si, 11Be+209Bi, 17F+208Pb, 6He+238U, 8He+197Au and 15C+232Th using quantum mechanical approach.  A

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (4)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Lark Journal
The problem of synonyms and similar words in the translation of the Holy Quran into Russian (based on the translation by Elmir Kuliev) اشكالية الترادف والكلمات المتقاربة في المعنى في ترجمة القران الكريم الى اللغة الروسية (بناءا على ترجمة إلمير كولييف) Проблема синонимов и близких по значению слов в переводе Священного Корана на русский язык (на материале перевода Эльмира Кулиева)
...Show More Authors

In our research, we dealt with one of the most important issues of linguistic studies of the Holy Qur’an, which is the words that are close in meaning, which some believe are synonyms, but in the Arabic language they are not considered synonyms because there are subtle differences between them. Synonyms in the Arabic language are very few, rather rare, and in the Holy Qur’an they are completely non-existent. And how were these words, close in meaning, translated in the translation of the Holy Qur’an by Almir Kuliev into the Russian language.

Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Using TD-ABC technology to determine idle production capacity: An applied research in Al-Wasat Oil Company
...Show More Authors

The aim of the research to apply TD-ABC technology to determine the idle capacity of the central oil companies (oil field east of Baghdad), as a modern cost management technology based on time-oriented activities (TD-ABC) is used by industrial companies in general and oil companies on In particular to build a sustainable Calvinist pillar and make future decisions by identifying idle energy to gain it a competitive advantage, the descriptive analytical approach has been adopted in calculating and analyzing the company’s data for 2018, and the most prominent conclusions of this research are managing idle energy and the task of applying cost technology on the basis of time-oriented activities and providing Convenient spatial infor

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 15 2017
Journal Name
International Journal Of Computer Applications
Assessment of Annual Wind Energy Potential at Three Sites in Iraq for Wind Energy Applications
...Show More Authors

Assessment of annual wind energy potential for three selected sites in Iraq has been analyzed in the present work. The wind velocities data from August 2014 to July 2015 were collected from the website of Weather Underground Organization (WUO) at stations elevation (35m, 32m, and 17m) for Baghdad, Najaf, and Kut Al-Hai respectively. Extrapolation of stations elevation and wind velocities was used to estimate wind velocities at (60m, 90m, and 120m). The objectives are to analyze the wind speed data and assess the wind energy potential for wind energy applications. Computer code for MATLAB software has been developed to solve the mathematical model. The results are presented as a monthly and annual average for wind velocities, standard deviat

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Nov 27 2024
Journal Name
Frontiers In Education
The impact of using artificial intelligence techniques in improving the quality of educational services/case study at the University of Baghdad
...Show More Authors

The utilization of artificial intelligence techniques has garnered significant interest in recent research due to their pivotal role in enhancing the quality of educational offerings. This study investigated the impact of employing artificial intelligence techniques on improving the quality of educational services, as perceived by students enrolled in the College of Pharmacy at the University of Baghdad. The study sample comprised 379 male and female students. A descriptive-analytical approach was used, with a questionnaire as the primary tool for data collection. The findings indicated that the application of artificial intelligence methods was highly effective, and the educational services provided to students were of exceptional quality.

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 06 2023
Journal Name
Materials Science Forum
Study of the Effect of Ce <sup>3+</sup> on the Gas Sensitivity and Magnetic Properties of Cu<sub>x</sub>Ce<sub>0.3-X</sub>Ni<sub>0.7</sub>Fe<sub>2</sub>O<sub>4</sub> Ferrite Nanoparticles
...Show More Authors

This study includes the preparation of the ferrite nanoparticles CuxCe0.3-XNi0.7Fe2O4 (where: x = 0, 0.05, 0.1, 0.15, 0.2, 0.25, 0.3) using the sol-gel (auto combustion) method, and citric acid was used as a fuel for combustion. The results of the tests conducted by X-ray diffraction (XRD), emitting-field scanning electron microscopy (FE-SEM), energy-dispersive X-ray analyzer (EDX), and Vibration Sample Magnetic Device (VSM) showed that the compound has a face-centered cubic structure, and the lattice constant is increased with increasing Cu ion. On the other hand, the compound has apparent porosity and spherical particles, and t

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Sat Sep 01 2018
Journal Name
International Journal Of Renewable Energy Research
Performance of Wind Turbines at Three Sites in Iraq
...Show More Authors

Matching between wind site characteristics and wind turbine characteristics for three selected sites in Iraq was carried out. Site-turbine matching for potential wind power application in Iraq has not yet been well reported on. Thus, in this study, five years’ wind speed data for sites located in Baghdad (33.34N, 44.40E), Nasiriyah (31.05N, 46.25E), and Basrah (30.50N, 47.78E) were collected. A full wind energy analysis based on the measured data, Weibull distribution function, and wind turbine characteristics was made. A code developed using MATLAB software was used to analyse the wind energy and wind turbines models. The primary objective was to achieve a standard wind turbine-site matching based on the capacity factor. Another matching

... Show More
View Publication
Crossref (1)
Crossref