Preferred Language
Articles
/
jeasiq-1408
حول توزيع الطلب خلال فترة الانتظار عند خضوع الطلب لتوزيع گاما وفترة الانتظار للتوزيع اللوغاريتمي الطبيعي (I)
...Show More Authors

سنقوم في هذا البحث باشتقاق توزيع الطلب خلال فترة الانتظار لنظام سيطرة على الخزين يخضع فيه الطلب لتوزيع گاما فيما يخضع وقت الانتظار للتوزيع اللوغايتمي الطبيعي، كما سيتم استخراج العزوم الأساسية لهذا المتغير ، الضرورية بدورها لاستخراج بعض مؤشرات النظام المذكور.

 

المصطلحات المستخدمة: التكامل المحيط، المستوي المركب، تكامل هانكيل، مستوى إعادة الطلب، الوقاية.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 11 2014
Journal Name
Baghdad Science Journal
'I-V Characteristic and Crystal Structural Of a-As/c-Si Heterojunctions
...Show More Authors

In this research the a-As flims have been prepared by thermal evaporation with thickness 250 nm and rata of deposition (1.04nm/sec) as function to annealing temperature (373 and 373K), from XRD analysis we can see that the degree of crystalline increase with , and I-V characteristic for dark and illumination shows that forward bias current varieties approximately exponentially with voltage bias. Also we found that the quality factor and saturation current dependence on annealing temperatures.

Publication Date
Fri Jan 07 2022
Journal Name
Materials
Impact Behavior of Composite Reinforced Concrete Beams with Pultruded I-GFRP Beam
...Show More Authors

The present study experimentally and numerically investigated the impact behavior of composite reinforced concrete (RC) beams with the pultruded I-GFRP and I-steel beams. Eight specimens of two groups were cast in different configurations. The first group consisted of four specimens and was tested under static load to provide reference results for the second group. The four specimens in the second group were tested first under impact loading and then static loading to determine the residual static strengths of the impacted specimens. The test variables considered the type of encased I-section (steel and GFRP), presence of shear connectors, and drop height during impact tests. A mass of 42.5 kg was dropped on the top surface at the m

... Show More
View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Wed Sep 28 2022
Journal Name
Journal Of The College Of Education For Women
The I and the Other (Lenora) in the Poetry of Joseph III
...Show More Authors

A literary text is not void of the use of the ego and the other while speaking or in a spoken communication. Such a usage is apparently outstanding in Arabic literature, and it reflects society in all its various cultural, social and political conditions. Therefore, the ego is one of the prominent concepts on which human personality is built, and its role in the formation of society and in communicating among all human societies. Accordingly, the present paper aims to clarify the duality of the ego and the other, where the ego starts from the poet himself to expand the circle of subjectivity by including his family, society, immediate surroundings, race and his religion. The other, on the other hand, that is separated from the poet,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2016
Journal Name
Spie Proceedings
Quantifying charge trapping and molecular doping in organic p-i-n diodes
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Fri Jan 07 2022
Journal Name
Materials
Impact Behavior of Composite Reinforced Concrete Beams with Pultruded I-GFRP Beam
...Show More Authors

Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
Hazard Rate Estimation Using Varying Kernel Function for Censored Data Type I
...Show More Authors

     In this research, several estimators concerning the estimation are introduced. These estimators are closely related to the hazard function by using one of the nonparametric methods namely the kernel function for censored data type with varying bandwidth and kernel boundary. Two types of bandwidth are used:  local bandwidth and global bandwidth. Moreover, four types of boundary kernel are used namely: Rectangle, Epanechnikov, Biquadratic and Triquadratic and the proposed function was employed with all kernel functions. Two different simulation techniques are also used for two experiments to compare these estimators. In most of the cases, the results have proved that the local bandwidth is the best for all the

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Fisheries & Aquatic Life
Directional fluctuating asymmetry in certain morphological characters as a pollution indicator: Tigris catfish (<i>Silurus triostegus</i>) collected from the Euphrates, Tigris, and Shatt al-Arab Rivers in Iraq
...Show More Authors
Abstract<p>The relationship between pollution levels in river sediment and fluctuating asymmetry of resident silurid fish species, <italic>Silurus triostegus</italic> Heckel, was assessed. Eight bilateral body proportions were analyzed in 1,500 fish from eight river locations. Sediment pollution was measured based on the analysis of heavy metals (Cd, Cr, Cu, Ni, Pb and Zn) and organochlorine pesticides (DDT, DDD, DDE, chlordane, dieldrin, and lindane). The mean quotient approach (mERMq) was used to characterize sediment toxicity, which ranged from low to moderate levels for heavy metals and from low to severe for organochlorides. Variation was noted in the measurements of fish body mor</p> ... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Research Journal Of Pharmacy And Technology
Impact of Human Cytomegalovirus Infection associated with the expressed protein of mutated <i>BRCA1</i> gene in breast tissues from a group of Iraqi Female Patients with Breast Carcinoma
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Cloud Data Security through BB84 Protocol and Genetic Algorithm
...Show More Authors

In the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources.  Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Investigation of heat transfer phenomena and flow behavior around electronic chip
...Show More Authors

Computational study of three-dimensional laminar and turbulent flows around electronic chip (heat source) located on a printed circuit board are presented. Computational field involves the solution of elliptic partial differential equations for conservation of mass, momentum, energy, turbulent energy, and its dissipation rate in finite volume form. The k-ε turbulent model was used with the wall function concept near the walls to treat of turbulence effects. The SIMPLE algorithm was selected in this work. The chip is cooled by an external flow of air. The goals of this investigation are to investigate the heat transfer phenomena of electronic chip located in enclosure and how we arrive to optimum level for cooling of this chip. These par

... Show More
View Publication Preview PDF