Preferred Language
Articles
/
jih-372
Design for Two Electrodes Electrostatic Mirror by using the Bimurzaev Technique
...Show More Authors

This paper describes theoretical modeling of electrostatic mirror based on two cylindrical electrodes, A computational investigation has been carried out on the design and properties of the electrostatic  mirror. we suggest a mathematical expression to represent the axial potential of an electrostatic mirror. The  beam path  by using the Bimurzaev technique have been investigated as a mirror trajectory with the aid of Runge – Kutta  method. the electrode shape of mirror two electrode has been determined by using package SIMION computer program . The spherical and chromatic aberrations coefficients of mirror has been computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements, i.e. each optical element in optical system at low spherical aberration or low chromatic aberration. Computations have shown that the suggested potential gave rise to mirror when the mirror applied  by using the Bimurzaev technique is deduced by having the following parameters: Cs=-7.49*10-7 mm, Cc=-2.15*10-4 mm, fR=4.7*10-3mm, L=6mm, C=1volt, D=500 volt.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 28 2021
Journal Name
Journal Of Economics And Administrative Sciences
The use of the genetic algorithm to estimate the parameters function of the hypoexponential distribution by simulation
...Show More Authors

In this research, the focus was placed on estimating the parameters of the Hypoexponential distribution function using the maximum likelihood method and genetic algorithm. More than one standard, including MSE, has been adopted for comparison by Using the simulation method

View Publication Preview PDF
Crossref
Publication Date
Tue Jan 05 2021
Journal Name
International Journal Of Research In Social Sciences & Humanities
THE SCIENCES OF THE QUR’AN IN THE INTERPRETATION OF A BRIGHTENING OF THE QUR’AN BY AL-TALAQANI
...Show More Authors

The paper deals with the study of the sciences of the Qur’an according to the interpreter, Ayatollah Sayyid Mahmoud al-Talaqani, a religious jihadist figure from Iran. He is the author of the exegesis (Ishraq from Al-Quran), which consists of six parts, which he wrote inside the prisons of the Shah and in exile. Mr. Al-Talaqani agreed with some of the commentators in his positions on the sciences of the Qur’an, and some of them disagreed with others.

Preview PDF
Crossref
Publication Date
Tue Feb 05 2019
Journal Name
Journal Of The College Of Education For Women
Shortcomings mentioned by the Torah about the prophet Lot in the prophecies and the respond of Quran
...Show More Authors

Praise be to Allah , and peace and blessings of God sent mercy to the worlds Muhammad
Amin and his family and his friends and followers to the Day of Judgement .
Savants Jews worked to distort the Torah calamity on the Prophet Moses ( peace be upon
him ) to achieve their goals and objectives , which are decorating sin to their followers , and
spreading corruption on earth, through the charge prophets Bmvassad , morality, as the
example and the example that emulate the human in the book of the Lord of the worlds and
their Prophet Lot, described the weak, and cheese, and lack of modesty, and disobedience ,
drinking alcohol , and his failure to raise his two daughters , Jews are corrupt in the ground .
Koran , which

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Adoption of Membership Level for Critical Activities In Knowledge Chain Model Building An Investigation Analytical Study Depending on Fuzzy Logic Architecture for Organizations Pushed by Knowledge
...Show More Authors

Abstract

   The aim of this research is to concentrate on the of knowledge management activities, initial activities: (Acquisition, Selection, Generation, Assimilation, Emission) knowledge, and support activities: (Measurement, Control, Coordination, Leadership) that is manipulate and controlling in achieving knowledge management cases in organization, that’s is leads to  knowledge chain model, then determining the level of membership for these activities to knowledge chain model in a sample of Iraqi organization pushed by knowledge (Universities). The research depends on check list for gaining the data required, theses check list designed by apparently  in diagnosing research dimensions and measurem

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Speech Analyses Method Using the Multiwavelet Transform
...Show More Authors

  Speech is the first invented way of communication that human used age before the invention of writing. In this paper, proposed method for speech analyses to extract features by using multiwavelet Transform (Repeated Row Preprocessing).The proposed system depends on the Euclidian differences of the coefficients of the multiwavelet Transform to determine the beast features of speech recognition. Each sample value in the reference file is computed by taking the average value of four samples for the same data (four speakers for the same phoneme). The result of the input data to every frame value in the reference file using the Euclidian distance to determine the frame with the minimum distance is said to be the "Best Match". Simulatio

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Estimate the Nonparametric Regression Function Using Canonical Kernel
...Show More Authors

    This research aims to review the importance of estimating the nonparametric regression function using so-called Canonical Kernel which depends on re-scale the smoothing parameter, which has a large and important role in Kernel  and give the sound amount of smoothing .

We has been shown the importance of this method through the application of these concepts on real data refer to international exchange rates to the U.S. dollar against the Japanese yen for the period from January 2007 to March 2010. The results demonstrated preference the nonparametric estimator with Gaussian on the other nonparametric and parametric regression estima

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Detect The Infected Medical Image Using Logic Gates
...Show More Authors

   This paper determined the difference between the first image of the natural and the second infected image by using logic gates. The proposed algorithm was applied in the first time with binary image, the second time in the gray image, and in the third time in the color image. At start of proposed algorithm the process  images by applying convolution to extended images with zero to obtain more vision and features then enhancements images by Edge detection filter (laplacion operator) and smoothing images by using mean filter ,In order to determine the change between the original image and the injury the logic gates applied specially X-OR gates . Applying the technique for tooth decay through this comparison can locate inj

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2015
Journal Name
Journal Of Hazardous Materials
The removal of caesium ions using supported clinoptilolite
...Show More Authors

View Publication
Scopus (31)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset
...Show More Authors

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Osseointegration & Oral Rehablitation
Evaluation of marginal bone loss around SLActive implants by CBCT using different implant dimensions and surgical approaches: A clinical and radiological prospective study
...Show More Authors

Aim: The reduction in the amount of marginal bone is the most important demand for the long term success of dental implants. This prospective clinical study was aimed to investigate the marginal bone loss of early loaded SLActive implants with different dimensions and surgical approaches. Materials and methods Fifteen patients aged from 18 to 60 years were divided into 2 groups (flapped and flapless approach) that underwent delayed implant placement protocol with SLActive implants. The marginal bone level was estimated by cone-beam computed tomography during three different periods: preoperatively, 8 weeks after surgery and 24 weeks after loading of the prosthesis. Results: The mean value of marginal bone level was not significantly chan

... Show More
View Publication Preview PDF
Scopus (4)
Scopus