Preferred Language
Articles
/
jeasiq-981
A practical study of the problems of queues for vehicles in some filling stations in the city of Baghdad
...Show More Authors

 According to the circumstances experienced by our country which led to Occurrence of many crises that are the most important crisis is gaining fuel therefore , the theory of queue ( waiting line ) had been used to solve this crisis and as the relevance of this issue indirect and essential role in daily life  .

This research aims to conduct a study of the distribution of gasoline station in (both sides AL – kharkh and AL Rusafa, for the purpose of reducing wasting time and services time through the criteria of the theory of queues and work to improve the efficiency of these stations by the other hand. we are working to reduce the cost of station and increase profits by reducing the active service unit so that do sent affect the process of waiting and the time of performance services.   the possibility of applying more than statistical distribution of data acess rate and the rate of services and best selection of distribution which reducing the time of service through statistical techniques to demonstrate the behavior of the data
(access rate and service rate) with in the statistical distribution that are consistent with the nature of data and select the best statistical distribution which affects the theory of the queues during the time of service and waiting time there are three categories for better know ledge of distribution are

 

  1. Poisson with Exponential
  2. Poisson with Weibull
  3. Erlang with Exponential

 

Asset of on clusion had been emerged from the study as using such
(G /G /C) queue model which includes the use through the current reality stations like AL– idrisi, AL– Mustansiriya and AL– galani the waiting time for the customer of services is mostly doesn’t have time to wait therefore, we suggest reducing the number of units in station and increase profit through the groups note that the distribution stations animate the few number of unit operating station such as AL– karkh (AL- khadra, AL– yarmouk and AL– shorta al– ola) the data access and service distributed according to the distribution of Poisson with Weibull the data access Service and distributed according to Poisson With Weibull station do the large number of units operating station such as
AL– Rusafa  (AL– idrisi, AL– Mustansiriya and AL– galani ) the data access and service distribution according to the distribution of Poisson with Exponential and Poisson with Weibull   .

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Abuse elder and relationship life review
...Show More Authors

The study aimed at identifying the domains of abuse of the elderly (each field separately) of the research sample. The study sample consisted of (100) senior citizens residing in nursing homes in Baghdad and Kirkuk cities. They were selected in a simple random way. In order to achieve the research objectives, two scales were developed to measure the abuse of the elderly consisted of six domains: Neglection abuse, emotional abuse, physical abuse, social abuse, financial abuse, sexual abuse), and the other to measure the life review. The results showed that the level of abuse of older people in the sample is higher than the average in the society they belong to, the level of life review was higher than the average they belong to, and the a

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Financial investment strategies – Conceptual Framework
...Show More Authors

The investor needs to a clear strategy for the purpose of access to the financial market, that is, has a plan to increase The share of the profits thinking entrepreneur and new, and highlights the importance of this in that it sets for the investor when it goes to the market, and when it comes out of it, and at what price to buy or sell the stock, and what is the the amount of money it starts. Fortunately, he does not need to invent his own investment strategy, because over the years the development of effective methods of buying and selling, and once you understand how to work these methods investor can choose the most appropriate methods and adapted image that fit his style investment .

  &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Sci.int.(lahore)
FILTER BASES AND SUPRA PERFECT FUNCTIONS
...Show More Authors

We introduce some new generalizations of some definitions which are, supra closure converge to a point, supra closure directed toward a set, almost supra converges to a set, almost supra cluster point, a set supra H-closed relative, supra closure continuous functions, supra weakly continuous functions, supra compact functions, supra rigid a set, almost supra closed functions and supra perfect functions. And we state and prove several results concerning it

Preview PDF
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Six-coordinate oxime-imine cobalt(III) complexes with amino acid co-ligands; synthesis and characterisation
...Show More Authors

In this publication, several six coordinate Co(III)-complexes are reported. The reaction of 2,3-butanedione monoxime with ethylenediamine or o-phenylenediamine in mole ratios of 2:1 gave the tetradentate imine-oxime ligands diaminoethane-N,N`-bis(2-butylidine-3-onedioxime) H2L1 and o-phenylenediamine-N,N`-bis(2-butylidine-3-onedioxime), respectively. The reaction of H2L1 and H2L2 with Co(NO3)2, and the amino acid co-ligands (glycine or serine) resulted in the formation of the required complexes. Upon complex formation, the ligands behave as a neutral tetradantate species, while the amino acid co-ligand acts as a monobasic species. The mode of bonding and overall geometry of the complexes were determined through physico-chemical and spectro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 16 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Filter Bases and j-ω-Perfect Mappings
...Show More Authors

This paper consist some new generalizations of some definitions such: j-ω-closure converge to a point,  j-ω-closure directed toward a set, almost  j-ω-converges to a set, almost  j-ω-cluster point, a set  j-ω-H-closed relative, j-ω-closure continuous mappings, j-ω-weakly continuous mappings, j-ω-compact mappings, j-ω-rigid a set, almost j-ω-closed mappings and  j-ω-perfect mappings. Also, we prove several results concerning it, where j ÃŽ{q, δ,a, pre, b, b}.

 

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Apr 15 2024
Journal Name
Nibal
يعتبر الاتصال وسيلة هادفة من الوسائل الرئيسية التي تستخدمها المنظمة الإدارية في تحقيق أهدافها إذ أن جميع العاملين يتعاملون مع بعضهم البعض من خلال وسائل الاتصال المختلفة من أجل ضمان تسيير نشاطاتهم وتحقيق أهدافهم وهذا يدل على أن الاتصال يعتبر الوسيلة الاجتماعية التي يحقق الأفراد من خلالها سبل التفاهم والتفاعل البناء
...Show More Authors

Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة مقدرات بيز لدالة المعولية لتوزيع باريتو من النوع الاول باستعمال دوال معلوماتية مضاعفة مختلفة
...Show More Authors

The comparison of double informative priors which are assumed for the reliability function of Pareto type I distribution. To estimate the reliability function of Pareto type I distribution by using Bayes estimation, will be  used two different kind of information in the Bayes estimation; two different priors have been selected for the parameter of Pareto  type I distribution . Assuming distribution of three double prior’s chi- gamma squared distribution, gamma - erlang distribution, and erlang- exponential distribution as double priors. The results of the derivaties of these estimators under the squared error loss function with two different double priors. Using the simulation technique, to compare the performance for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Couniform Modules
...Show More Authors

In this paper, we introduce and study a new concept named couniform modules, which is a dual notion of uniform modules, where an R-module M is said to be couniform if every proper submodule N of M is either zero or there exists a proper submodule N1 of N such that is small submodule of Also many relationships are given between this class of modules and other related classes of modules. Finally, we consider the hereditary property between R-module M and R-module R in case M is couniform.

View Publication Preview PDF
Crossref (3)
Crossref