Preferred Language
Articles
/
jeasiq-927
Eatimation Availability Function Through Determination The Optimal Imperfect Preventive Maintenance Period By using Simulation
...Show More Authors

This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.

According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability

p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive

preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the

average durations of the preventive and corrective maintenance actions as well as their respective efficiency extents, a mathematical model

is developed in order to study the evolution of the system stationary availability and determine the optimal PM period which maximizes

  1. The modeling of the imperfection of the corrective maintenance actions requires the knowledge of the quasi-renewal function when times to first failure follow a Weibull Distribution.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Eye movements, and their psychological significance   In the Holy Quran: (Study in non-verbal language)
...Show More Authors

In this research, the researchers attempted to reveal the non-verbal language in the Holy Qur'an through the hurt of the eye, its communicative effect, and its psychological significance in order to demonstrate the importance of this language. Fold the search ..

View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Assessment of Health Care Quality through Clients’ Perspectives at Outpatient Consultancy Clinics in Al-Hilla City Hospitals
...Show More Authors

Objectives: To assess quality of health care for clients at outpatient consultancy clinics in Al-Hilla City Hospitals, and to find out significant differences between the clients' perspectives toward quality of health care dimensions and their demographic characteristics such as (residence, age, gender, level of education, and occupation ).
Methodology: A descriptive analytic study design was carried out at outpatient consultancy clinics of Al- Hilla city hospital (Al-Hilla and Al-Imam Al-Sadiq general teaching hospital) from April 10 th to June 15 th 2019. Non – probability (purposive) sample of 200 clients who were coming to the Outpatient Consultancy Clinics were selected. Data is collected through used of an assessment tools an

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 28 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Macton's Method for Developing Non-Linguistic Cognitive Sensory Skills for Autistic Spectrum Children
...Show More Authors

The present study aimed at identifying the effectiveness of Macaton method in improving some sensory and cognitive skills in autistic children. In order to achieve the aims of the study, the researcher used the experimental method. The present study sample was (10) children whose ages ranged between (7-10) years and were diagnosed medically with autism disorder. The researcher randomly selected the sample and divided it into two groups: the first group consisted of (5) children representing the experimental group, and (5) children representing the control group after extracting the equivalence between the two groups in terms of age, intelligence, economic and social level and the degree of communication. The program was implemented for t

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
An Analysis of a Partial Temporary Immunity SIR Epidemic Model with Nonlinear Treatment Rate
...Show More Authors

     A partial temporary immunity SIR epidemic model involv nonlinear treatment rate is proposed and studied. The basic reproduction number  is determined. The local and global stability of all equilibria of the model are analyzed. The conditions for occurrence of local bifurcation in the proposed epidemic model are established. Finally, numerical simulation is used to confirm our obtained analytical results and specify the control set of parameters that affect the dynamics of the model.

View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Steady State Performance Investigation of a Three Phase Induction Motor Running Off Unbalanced Supply Voltages
...Show More Authors

The objective of this work is to investigate the performance of a conventional three phase induction motor supplied by unbalanced voltages. An effort to study the motor steady state performance under this disturbance is introduced. Using per phase equivalent circuit analysis with the concept of symmetrical components approach, the steady state performance is theoretically calculated. Also, a model for the induction motor with the MATLAB/Simulink SPS tools has been implemented and steady state results were obtained. Both results are compared and show good correlation as well. The simulation model is introduced to support and enhance electrical engineers with a complete understanding for the steady state performance of a fully loaded induc

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 26 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Return Variation on Investment as a Function for the Difference of Market Share: An Applied Research on a Sample of Private Banks listed in Iraq Stock Exchange (ISX)
...Show More Authors

    The research specified with study the relation  between the market share for the sample research banks and the amount of the achieved revenues from the investment, where the  dominated belief  that there potentiality enhancing the revenue on investment with the increase of the banks shares in their markets after their success in achieving rates of successive growth in their sales of sales and to a suitable achieve  market coverage for their products and they have dissemination and suitable  promotion activity, the  market share represented the competition  for the banks, and the markets pay attention to the  market share as a strategic objective and to maintain them also increasi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Comparative Study of Image Denoising Using Wavelet Transforms and Optimal Threshold and Neighbouring Window
...Show More Authors

NeighShrink is an efficient image denoising algorithm based on the discrete wavelet
transform (DWT). Its disadvantage is to use a suboptimal universal threshold and identical
neighbouring window size in all wavelet subbands. Dengwen and Wengang proposed an
improved method, which can determine an optimal threshold and neighbouring window size
for every subband by the Stein’s unbiased risk estimate (SURE). Its denoising performance is
considerably superior to NeighShrink and also outperforms SURE-LET, which is an up-todate
denoising algorithm based on the SURE. In this paper different wavelet transform
families are used with this improved method, the results show that Haar wavelet has the
lowest performance among

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
Expressing the Bewilderment of the Modern Man through Silence in Samuel Beckett’s Happy Days: بسعاد ماهر محيل, ومنذر عبد الرزاق سبع
...Show More Authors

Samuel Beckett’s Happy Days (1961) clearly portrays a lack of communication among the characters of the play which refers to the condition of modern man. This failure of communication led Samuel Beckett to use a lot of pauses and silences in all plays written instead of using words. To express the bewilderment of the modern man during the 20th century, Beckett adopts the use of no language strategy in the dramatic works. After World War II, people were without hope, religion, food, jobs, homes, or even countries. Beckett gave them a voice. He used a dramatic language out of everyday things, in which silence was part of the syntax as a poetic repetition. Language is no more important to the modern man; instead, he us

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Estimate size sub-population by Killworth method
...Show More Authors

The aim of the thesis is to estimate the partial and inaccessible population groups, which is a field study to estimate the number of drug’s users in the Baghdad governorate for males who are (15-60) years old.

Because of the absence of data approved by government institutions, as well as the difficulty of estimating the numbers of these people from the traditional survey, in which the respondent expresses himself or his family members in some cases. In these challenges, the NSUM Network Scale-Up Method Is mainly based on asking respondents about the number of people they know in their network of drug addicts.

Based on this principle, a statistical questionnaire was designed to

... Show More
View Publication Preview PDF
Crossref