Preferred Language
Articles
/
jeasiq-2349
Estimation of Reliability through the Wiener Degradation Process Based on the Genetic Algorithm to Estimating Parameters
...Show More Authors

      In this paper, the researcher suggested using the Genetic algorithm method to estimate the parameters of the Wiener degradation process,  where it is based on the Wiener process in order to estimate the reliability of high-efficiency products, due to the difficulty of estimating the reliability of them using traditional techniques that depend only on the failure times of products. Monte Carlo simulation has been applied for the purpose of proving the efficiency of the proposed method in estimating parameters; it was compared with the method of the maximum likelihood estimation. The results were that the Genetic algorithm method is the best based on the AMSE comparison criterion, then the reliability was estimated by an inverse Gaussian distribution according to the characteristics of the Wiener process. It was also applied based on real data taken from an experiment intended to determine the degradation in the light intensity of lamps under specific experimental conditions

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 04 2019
Journal Name
Journal Of Planner And Development
تقدير كمية الغاز الحيوي المنبعث من مناطق الطمر الصحي في المدينة العراقية الحالة الدراسية-مدينة الرمادي
...Show More Authors

View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Feb 13 2023
Journal Name
Journal Of Educational And Psychological Researches
Prosoical Behavior and Its Relationship to Openness to Experience among University Students
...Show More Authors

The aim of the present study is to identify the level of prosoical behavior of Baghdad University's students and to recognize the differences between male and female students. Moreover, it also aims to identify the level of openness to experience for these students. A random sample of (123) students has been selected; 77 males and 46 females. Two scales have been used in the study. The Prosocialness scale for adults by Caprara. Et al (2005) has been translated into the Arabic language and relies on four types of actions (Helping, Sharing, Taking care, and feeling Empathetic with others) and the other scale is the Openness to Experience Scale, which is one of the Big Five Inventory by John and Srivastava (1999). The main results showed a

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Correlation of Paschen parameters in magnetized argon plasma
...Show More Authors

A number of glow discharge experiments has been carried out in a relatively large-volume metallic vacuum chamber containing argon at low pressure and immersed in an inhomogeneous magnetic field generated by a solenoidal coil capable of delivering 2100G. Two Paschen curves demonstrating the dependence of the discharge voltage on sparking parameter Pd and magnetic field strength B were deduced. A graphical correlation showing the behaviour of the voltage difference from the two curves on the ratio B/Pd was constructed. Investigations showed a reduction in the nominal impedance of the discharge device of nearly 20% when B reaches a value of 525G. Plasma confinement regions were found around the internal surface of the chamber at the entranc

... Show More
View Publication Preview PDF
Publication Date
Sun Aug 01 2021
Journal Name
Laser Micro- And Nano-scale Processing
Effective working parameters of laser micro-/nano-machining
...Show More Authors

Modern emerged technologies impose development and fabrication of miniatur-ized parts and devices in the micro- and nano-scale. Producing micro- and nano-featured structures requires nonconventional machining processes where con-ventional machining processes such as grinding, milling and eroding have failed. New emerging processes, such laser machining processes, are still fraught with almost invincible processes. Micro-/nano-machining are the pro-cesses of producing parts, microsystems or features at a scale of a few microm-eters and less than one hundred nanometers, respectively. Precise cutting and clean material removal accompanied with a negligible heat affected zone (HAZ), which are usually the characteristics of laser ablation, have

... Show More
View Publication
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
‏Framing war against ISIS in New York Times/ from 10/17/2016 to 4/16/2017
...Show More Authors

The research is aimed at investigating how the New York Times framed the war against ISIS in its news coverage and which news sources it adopted while reporting on this war.
‏ The research could be classified under descriptive researches. The survey methodology has been adopted and the content analysis has been used. The research sample consists of all the news stories the New York Times have published about the war against ISIS from 10/17/2016 to 4/16/2017 according to the comprehensive sampling method. The number of news stories that were analyzed was (155) news story. The research tool was (coding scheme).
The research has reached the following conclusions:
‏ 1. In its news coverage of the war against ISIS, the New York T

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 13 2011
Journal Name
Iraqi Journal Of Laser
The Efficacy of Er:YAG Laser on Intrapulpal Temperature Rise of Class V Cavity Preparation
...Show More Authors

The objective of this study is to determine the efficacy of class V Er:YAG laser (2940 nm) cavity preparation and conventional bur cavity preparation regarding Intrapulpal temperature rise during cavity preparation in extracted human premolar teeth. Twenty non carious premolar teeth extracted for orthodontic purposes were used and class V cavity preparation was applied both buccal and lingual sides for each tooth .Samples were equally grouped into two major groups according to cavity depth (1mm and 2mm). Each major group was further subdivided into two subgroupsof ten teeth for each (twenty cavities for each subgroup). TwinlightEr:YAG laser (2940 nm) with 500mJ pulse energy, P.R.R of 10 Hz and 63.69 J/cm2 energy density was used. The ana

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2011
Journal Name
Journal Of Engineering
IMPLEMENTATION OF ROOT FINDING ALGORITHM OF MINIMUM PHASE FILTER USING VHDL
...Show More Authors

Root-finding is an oldest classical problem, which is still an important research topic, due to its impact on computational algebra and geometry. In communications systems, when the impulse response of the channel is minimum phase the state of equalization algorithm is reduced and the spectral efficiency will improved. To make the channel impulse response minimum phase the prefilter which is called minimum phase filter is used, the adaptation of the minimum phase filter need root finding algorithm. In this paper, the VHDL implementation of the root finding algorithm introduced by Clark and Hau is introduced.
VHDL program is used in the work, to find the roots of two channels and make them minimum phase, the obtained output results are

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 13 1998
Journal Name
المجلة العراقية للاحياء المجهرية
EFFECT OF SALTS CONCENTRATIONS AND CARBON SOURCES ON THE GROWTH OF EXTREMELY HALOPHILIC BACTERIA, GENUS Halobacterium
...Show More Authors

ABSTRACT The isolation and characterization of (27) isolate of extreme halophilic bacteria was performed ninteen isolate belonged to the genus Halobacterium which included Hb.halobium. Hb. salinarium, Hb. volcanii. Growth curve and generation time in logarthmic phase was measured and found to be (12.8hr±0.32), (11.2hr±0.2), (9.8hr±0.87), respectivaly. Effect of various concentrations of NaCl, KCI, NH4Cl and MgSO4.7H2O was studied, NaCl was essential for the rod shape rapid growth Rat and pigmentation. Less than 1% concentration caused lysis of bacteria. Yeast extract was the best carbone source as compared with glucose and casamino acid.

Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
Statistical Analysis of Metal Removal during Magnetic Abrasive Finishing Process
...Show More Authors

This work aims to provide a statistical analysis of metal removal during the Magnetic Abrasive Finishing process (MAF) and find out the mathematical model which describes the relationship between the process parameters and metal removal, also estimate the impact of the parameters on metal removal. In this study, the single point incremental forming was used to form the truncated cone made of low carbon steel (1008-AISI) based on the Z-level tool path. Then the finishing was accomplished using a magnetic abrasive process based on the Box-Behnken design of the experiment using Minitab 17 software was used to finish the surface of the formed truncated cone. The influences of different parameters (feed rate, machining step s

... Show More
View Publication Preview PDF
Crossref (5)
Crossref