Preferred Language
Articles
/
joe-1584
Assessment Strategies of Fixed Firefighting system in Residential Multi-Story Building for Improving Fire Safety: A Review
...Show More Authors

A fixed firefighting system is a key component of fire safeguarding and reducing fire danger. It is installed as a permanent component in a structure to protect the entire or a portion of the building and its contents. The study aims to review the previous studies that deal with the evaluation of fire safety measures and their use in resolving problems associated with fire threats in buildings. For this reason, a number of previous studies in this field were reviewed compared with the NFPA code. The findings revealed that regulatory developments over the last several decades had created an atmosphere conducive to innovation. This has resulted in a growth in the number of fixed firefighting system types now obtainable. These solutions provide substantial distinction in terms of performance and hence safety. Not only is the availability of different fire risk alleviation systems important, but so is the election of the most convenient solution for the job. This is typically seen inside regulatory procedures and basics of thumb or heuristics and depends on the knowledge and expertise of divergent specialists. When several perceived danger and results thresholds are surpassed, fixed firefighting systems are frequently included as extra fire protection and resilience measures

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Applying some hybrid models for modeling bivariate time series assuming different distributions for random error with a practical application
...Show More Authors

Abstract

  Bivariate time series modeling and forecasting have become a promising field of applied studies in recent times. For this purpose, the Linear Autoregressive Moving Average with exogenous variable ARMAX model is the most widely used technique over the past few years in modeling and forecasting this type of data. The most important assumptions of this model are linearity and homogenous for random error variance of the appropriate model. In practice, these two assumptions are often violated, so the Generalized Autoregressive Conditional Heteroscedasticity (ARCH) and (GARCH) with exogenous varia

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 14 2023
Journal Name
International Journal Of Information Technology & Decision Making
A Decision Modeling Approach for Data Acquisition Systems of the Vehicle Industry Based on Interval-Valued Linear Diophantine Fuzzy Set
...Show More Authors

Modeling data acquisition systems (DASs) can support the vehicle industry in the development and design of sophisticated driver assistance systems. Modeling DASs on the basis of multiple criteria is considered as a multicriteria decision-making (MCDM) problem. Although literature reviews have provided models for DASs, the issue of imprecise, unclear, and ambiguous information remains unresolved. Compared with existing MCDM methods, the robustness of the fuzzy decision by opinion score method II (FDOSM II) and fuzzy weighted with zero inconsistency II (FWZIC II) is demonstrated for modeling the DASs. However, these methods are implemented in an intuitionistic fuzzy set environment that restricts the ability of experts to provide mem

... Show More
View Publication
Scopus (3)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.

Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Prevent administrative and financial corruption behaviors by activating the functions of the organizational immunity system
...Show More Authors

The current research aims at testing the relationship between organizational immunity and preventing administrative and financial corruption (AFC) in Iraq. The Statistical Package for the Social Sciences program (R& SPSS) was used to analyse the associated questionnaire data. The research problem has examined how to activate the functions of the organizational immune system to enable it to face organizational risks, attempt to prevent administrative and financial corruption, and access the mechanisms by which to develop organizational immunity. A sample of 161 individuals was taken who worked in the Directorate General of Education, Karbala. Also, it was concluded to a lack of memory function for organizational immunity. In a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Cogent Engineering
IEC 60909 and ANSI standards comparison with ASCC based fault calculations of Iraqi power system
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Electric Power Systems Research
Electromagnetic transient modeling of form-wound stator coils with stress grading system under PWM excitation
...Show More Authors

The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the

... Show More
Crossref (5)
Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
The Effect of Organizational Creativity in Enhancing Knowledge Management Processes: survey study for a sample of academic staff members at the Technical College of management / Baghdad)
...Show More Authors

In many organizations, employees who have high mental skills are the main source of organizational creativity. When a firm does not put creativity as a goal, cannot stand solid against the competition. Nowadays, knowledge is the path to discover the innovation and creativity aspects, This can assist the firm to stand face to face with competition in the market. The importance of this research comes from detecting and knowing the relation between creativity and knowledge to know and detect the influence of organizational creativity on backing the management of knowledge and determine the final results. The problem of research is to trace the role of organizational creativity on knowledge management processes in order to enable the

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 15 2022
Journal Name
مجلة كلية الاداب | جامعة بغداد
STRUCTURAL AND TYPOLOGICAL FEATURES OF UNITS OF THE RUSSIAN TERMINOLOGICAL SYSTEM OF THE OIL AND GAS INDUSTRY
...Show More Authors

Preview PDF
Publication Date
Thu Dec 13 2018
Journal Name
Al-adab Journal
A Victim of "Love": A Study of Beatrice’s Character in "Rappaccini's Daughter" By Nathanial Hawthorne
...Show More Authors

Nathaniel Hawthorne (1804-1864) has been widely known for his special interest in the female characters. In many of his novels, he narrates the conditions, values, and the institutions that surround and control the life of women, leading them to be victims. In “Rappaccini’s Daughter” (1844), the heroine, Beatrice is created to be victimized by her loved ones (her father and lover). This paper focuses on the term “victim,” it shows its aspects through the development of Beatrice’s character. The paper also studies a female character in the male-dominated society, to show the cruelty done to her, and how she is considered to be a second rate person, who is unable to live normally, or at least to save herself from dea

... Show More
View Publication
Crossref