Preferred Language
Articles
/
jeasiq-371
The Use of Particle Swarm Algorithm to Solve Queuing Models with Practical Application
...Show More Authors

This paper includes the application of Queuing theory with of Particle swarm algorithm or is called (Intelligence swarm) to solve the problem of The queues and developed for General commission for taxes /branch Karkh center in the service stage of the Department of calculators composed of six  employees , and it was chosen queuing model is a single-service channel  M / M / 1 according to the nature of the circuit work mentioned above and it will be divided according to the letters system for each employee, and  it was composed of data collection times (arrival time , service time, departure time) In minutes , Where it was data Test the obtained them found it distributed statistical distribution commensurate with the nature of the data and when tested were found to be distributed the distribution of arrival (Discrete Uniform distribution) and the distribution service (Exponential distribution ) , and it was finding performance measures (the service provided) in the system ( Ls , Lq , Ws , Wq ), and the problem is resolved to the research using software MATLAB R2013a Version : 8.1  and it get the required results, and This paper aims Solve the problem of The queues in General commission for taxes / branch Karkh center and reduce the customer waiting times and improving the efficiency of the service provided.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Oct 11 2022
Journal Name
College Of Islamic Sciences
Judgment of the judge with his knowledge
...Show More Authors

 

The summery of my research marked by the judges judgment with his knowledge, I dealt with the definition of the judiciary, linguistically and idiomatically, and the importance and ligitimcy of the judiciary, as the judiciary is one of the most importunt pillars of lslam,inwhich justice as it proves the truth to its owners.

 

View Publication Preview PDF
Publication Date
Thu Jun 29 2017
Journal Name
College Of Islamic Sciences
Violations of women to men in the jurisprudence of Hajj
...Show More Authors

In the name of of Allah the Merciful

 

Introduction:

Praise be to Allah, Lord of the Worlds, and prayers and peace be upon our master Muhammad and his family and companions.

After

I have looked at a part of the jurisprudence of Hajj jurisprudence, which is needed now, especially after it facilitated travel to perform Hajj and Umrah, so the need was an advocate and a list for writing in it, which is beneficial to Hajj, Umrah and the guide.

And this important part is the things that contravene the woman's man in the Hajj and after the search and tracking found that there are ten things that get the violati

... Show More
View Publication Preview PDF
Publication Date
Sun May 15 2022
Journal Name
Al-kindy College Medical Journal
Assessment of Nurses’ Knowledge, Attitude, and Practices on Antibiotic Use and Resistance in Baghdad: A single-hospital study
...Show More Authors

Background: There are so many evidences that there was antimicrobial resistance, and there were many strains that emerged which were difficult to treat. We are living in a situation that the dissemination of multiple drug resistant bacteria can lead us to the situation, in which no treatment could be offered for bacterial infection in future.

Aim of study: Assessment of nurses’ knowledge, attitude, and practices on antibiotic use and resistance in Fatima Al Zahra hospital in Baghdad.

Subjects and Methods:  A cross-sectional study. The study was carried on from 1st of February to 31st of March 2021.  A questionnaire was constructed by the research team based on literature review and was adapted to asses

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 22 2020
Journal Name
Baghdad Science Journal
Splitting the One-Dimensional Wave Equation. Part I: Solving by Finite-Difference Method and Separation Variables
...Show More Authors

In this study, an unknown force function dependent on the space in the wave equation is investigated. Numerically wave equation splitting in two parts, part one using the finite-difference method (FDM). Part two using separating variables method. This is the continuation and changing technique for solving inverse problem part in (1,2). Instead, the boundary element method (BEM) in (1,2), the finite-difference method (FDM) has applied. Boundary data are in the role of overdetermination data. The second part of the problem is inverse and ill-posed, since small errors in the extra boundary data cause errors in the force solution. Zeroth order of Tikhonov regularization, and several parameters of regularization are employed to decrease error

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Diyala Journal Of Medicine
Histological Evaluation of Local Application of Flavonoid Extract of Capparis Spinosa on Wound Healing in Alloxan-Induced Diabetic Rats
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Petroleum Science And Technology
Lithofacies and electrofacies models for Mishrif Formation in West Qurna oilfield, Southern Iraq by deterministic and stochastic methods (comparison and analyzing)
...Show More Authors

View Publication
Scopus (14)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Tue Aug 03 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The relationship of the investment environment with the indicators of the national economy
...Show More Authors

The investment environment is the incubator for all types of domestic and foreign investments, so if their determinants are encouraging, they increase the levels of investment flows and vice versa, as there is a relationship between the nature of the investment environment and the level of investment flows, and the determinants of the investment environment are numerous and the most important of which are security and political stability, and economic and financial factors that include relative stability In the exchange rate and inflation rates, the availability of banks and their development, transparency and integrity in administrative dealings and the lack of prevalence of administrative and financial corruption, and the clari

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 07 2023
Journal Name
Journal Of Educational And Psychological Researches
The Contribution of Behavioral Disorders to Predicting Bullying Patterns in a Sample of Adolescents with Autism Spectrum Disorder: College of Education and Arts - Northern Border University - Kingdom of Saudi Arabia.
...Show More Authors

The present study aims to identify the role of behavioral disorders (anxiety disorder, behavior disorder "behavior", confrontation and challenge disorder, aggressive behavior) in predicting bullying patterns (verbal, physical, electronic, school) in a sample of adolescents with autism spectrum disorder. For this purpose, the researcher developed scales to measure the behavioral disorders and the bullying patterns among adolescents with autism spectrum disorder. The researcher adopted the descriptive survey approach. The study sample consists of (80) adolescents with autism spectrum disorder with ages range from (15-19 years) and (45-53 years old) in association with israr association for people with special needs in the northern borders

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
Proposed an Adaptive Bitrate Algorithm based on Measuring Bandwidth and Video Buffer Occupancy for Providing Smoothly Video Streaming
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Crossref