Preferred Language
Articles
/
jeasiq-2349
Estimation of Reliability through the Wiener Degradation Process Based on the Genetic Algorithm to Estimating Parameters
...Show More Authors

      In this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process,  where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliability was estimated by an inverse Gaussian distribution according to the characteristics of the Wiener process. It was also applied based on real data taken from an experiment intended to determine the degradation in the light intensity of lamps under specific experimental conditions

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Feb 14 2022
Journal Name
Journal Of Educational And Psychological Researches
The Educational and Psychological Effects of Social Networking websites on Iraqi Society
...Show More Authors

The aim of the research is to identify the educational and psychological effects of the positive and negative aspects of using social networking websites. The researcher administered a number of questions to (250) users of different types of social networking websites. He analyzed his research results and obtained a number of results. The research has reached a number of recommendations and suggestion: Regulating the use of social media. Monitoring the parents of the sites used by children in a way that they do not feel they are observers. It is necessary to devote an hour daily to show the importance of real social life for children other than using social media. It is necessary to show the importance of choosing friends who hav

... Show More
View Publication Preview PDF
Publication Date
Mon Nov 24 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Estimation of the Bennett mandibular immediate side shift in Iraqi full mouth rehabilitation patients (An in vivo study)
...Show More Authors

Background: Controversy exists concerning the presence and amount of the Bennett mandibular immediate side shift among patients and whether it is necessary to accommodate for it in adjustable articulators. The aim of this study was to register and calculate the amount of any immediate side shift (ISS) present in patients requiring full mouth rehabilitation. Materials and methods: 3- dimensional condylar movements of 50 Iraqi TMD-free patients were recorded using a stereographic fully adjustable articulator system during protrusion, left and right eccentric mandibular movements. Protrusive angles of each patient were verified to figure out the suitable fossa analog for each case. The thickness of each right and left premade fossa analog sele

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Performance evaluation of small and medium-sized enterprises according to the entrance of the scorecard applied study in company Al fadly for construction industries
...Show More Authors

The research Aim is to provide support to small enterprises by providing tools that enable measurement and test their performance and identifying weaknesses and work on them is determined by the problem of searching using traditional assessment methods for small projects with only financial performance measurement standards that do not provide a complete picture of the performance of these projects so use the balanced scorecard the four pillars (financial, customer, learning and growth, and internal processes) and identify deviations and work on them through the use of the outputs of the programme (probe), PROmoting Business Excellence-PROBE), which It is a model of performance evaluation, with which you can deve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
College Of Islamic Sciences
The Ash'aris and their position on faith, An Ideological Study: الايمان
...Show More Authors

 

The Ash'aris and their position on faith, An Ideological Study

Omed AbdulQader rasool               

College of Islamic Sciences/Salahaddin University-Erbil

Abstract

The concept of faith is very complex, and there are a lot of talk about it among the major Islamic groups such as the Kharijites, the Mu'tazila, the Jahmiyya and others, because of its great importance, and the worldly and eschatological effects it entails according to the elements of faith such as recognition, ratification and action.

The researcher chose one sect, which is the

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of The College Of Education For Women
Future Visions and its Relationship with Illegal Immigration among Next to Graduation Students
...Show More Authors

The current study was concerned to address these gaps in literature by identifying: first level and type of future visions among the next graduation student, second level and type of future visions among the sample according to gender (Male- Female), third level of the illegal immigration among the sample, fourth level of the illegal immigration according to gender (Male, Female), and finally the relationship between future visions and illegal immigration. To achieve the aims of the current study, the researchers created a questionnaire for the future visions. The psychometric properties (e.g. face validity, structure validity, and reliability) were tested. Base on the current sample, results showed that the questionnaire had sound psych

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Wide-range tunable subwavelength band-stop filter for the far-infrared wavelengths based on single-layer graphene sheet
...Show More Authors

Scopus (5)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Auditor's Evaluation of The Detected Misstatements and Their Reflection on The Administration's Actions is: an Applied Research in the General Company for Grain Processing
...Show More Authors

Some auditors may think that the audit process ends with discovering misstatements and informing management about them, while the discovery of misstatements may be classified by some as the first step in the phase of separating these distortions, as the auditor should collect these misstatements, evaluate them and detail them into misstatements involving errors or misstatements involving fraud Then evaluating it to material or immaterial according to what was stated in the international auditing standards and directing management to amend the essential ones.  The importance of this research lies in identifying the concept of distortions and their types, identifying the method of evaluating distortions into substantial and non-essent

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Removing of Hexavalent Chromium from Aqueous Solutions Using Dried Yogurt, and Studying Isotherm, Kinetic and Thermodynamic Parameters
...Show More Authors

     In this study, Yogurt was dried and milled, then shaked with distilled water to remove the soluble materials, then again dried and milled. Batch experiments were carried out to remove hexavalent chromium from aqueous solutions. Different parameters were optimized such as amount of adsorbent, treatment time, pH and concentration of adsorbate. The concentrations of Cr6+ in solutions are determined by UV-Visible spectrophotometer.  Maximum percentage removal of Cr6+ was 82% at pH 2. Two equilibrium adsorption isotherms mechanisms are tested Langmuir and Freundlich, the results showed that the isotherm obeyed to Freundlich isotherm. Kinetic models were applied to the adsorption of Cr6+ ions on the adsorbents, ps

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
A Semi-Supervised Machine Learning Approach Using K-Means Algorithm to Prevent Burst Header Packet Flooding Attack in Optical Burst Switching Network
...Show More Authors

Optical burst switching (OBS) network is a new generation optical communication technology. In an OBS network, an edge node first sends a control packet, called burst header packet (BHP) which reserves the necessary resources for the upcoming data burst (DB). Once the reservation is complete, the DB starts travelling to its destination through the reserved path. A notable attack on OBS network is BHP flooding attack where an edge node sends BHPs to reserve resources, but never actually sends the associated DB. As a result the reserved resources are wasted and when this happen in sufficiently large scale, a denial of service (DoS) may take place. In this study, we propose a semi-supervised machine learning approach using k-means algorithm

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref