Abstract
In this study, we compare between the autoregressive approximations (Yule-Walker equations, Least Squares , Least Squares ( forward- backword ) and Burg’s (Geometric and Harmonic ) methods, to determine the optimal approximation to the time series generated from the first - order moving Average non-invertible process, and fractionally - integrated noise process, with several values for d (d=0.15,0.25,0.35,0.45) for different sample sizes (small,median,large)for two processes . We depend on figure of merit function which proposed by author Shibata in 1980, to determine the theoretical optimal order according to min
... Show MoreIn this study, gamma ray transmission method have been used to determine the total porosity in four samples: pure Alumina ( Al2O3 ), Al2O3 + (0.2wt%)MgO , Al2O3 + (0.6wt% )Y2O3 and Al2O3+ (8wt% ) ZrO2 .
The experimental setup for the gamma ray transmission consist of 137Cs gamma source ( 662 KeV ), a NaI (Tl) scintillation detector measured the attenuation of strongly collimated gamma beam through alumina samples.
The porosity obtained by the gamma ray transmission method were compare
... Show MoreWeibull distribution is considered as one of the most widely distribution applied in real life, Its similar to normal distribution in the way of applications, it's also considered as one of the distributions that can applied in many fields such as industrial engineering to represent replaced and manufacturing time ,weather forecasting, and other scientific uses in reliability studies and survival function in medical and communication engineering fields.
In this paper, The scale parameter has been estimated for weibull distribution using Bayesian method based on Jeffery prior information as a first method , then enhanced by improving Jeffery prior information and then used as a se
... Show MoreA simple, precise, rapid, and accurate reversed – phase high performance liquid chromatographic method has been developed for the determination of guaifenesin in pure from pharmaceutical formulations.andindustrial effluent. Chromatography was carried out on supelco L7 reversed- phase column (25cm × 4.6mm), 5 microns, using a mixture of methanol –acetonitrile-water: (80: 10 :10 v/v/v) as a mobile phase at a flow rate of 1.0 ml.min-1. Detection was performed at 254nm at ambient temperature. The retention time for guaifenesin was found 2.4 minutes. The calibration curve was linear (r= 0.9998) over a concentration range from 0.08 to 0.8mg/ml. Limit of detection (LOD) and limit of quantification ( LOQ) were found 6µg/ml and 18µg/ml res
... Show MoreThis study was undertaken to introduce a fast, accurate, selective, simple and environment-friendly colorimetric method to determine iron (II) concentration in different lipstick brands imported or manufactured locally in Baghdad, Iraq. The samples were collected from 500-Iraqi dinars stores to establish routine tests using the spectrophotometric method and compared with a new microfluidic paper-based analytical device (µPAD) platform as an alternative to cost-effective conventional instrumentation such as Atomic Absorption Spectroscopy (AAS). This method depends on the reaction between iron (II) with iron(II) selective chelator 1, 10-phenanthroline(phen) in the presence of reducing agent hydroxylamine (HOA) and sodium acetate (NaOAc) b
... Show MoreThe aim of the research is to shed light on identifying the extent of the university professor's competencies and their roles in managing and training participants in e-training workshops as a pedagogical point view. The research sample consisted of a group of (30) university professors (lecturers) in the training workshops, in scientific,humanitarian and social disciplines, including (12) a university professor (holding a trainer certificate), , the research methodology is descriptive, and the community is a group of trained participants. (115) participated in (40) e-training workshops organized by the Center for Continuing Education at the University of Baghdad (and the selection of workshops within the researcher's specialization in the
... Show MoreBackground: The aim of this in vitro study was to evaluate and compare the effect of preheating microleakage among three different filler size composites which include Filtektm Z250 micro hybrid, Z250xt Nano hybrid and nanocomposite Z350xt. in Class II cavity preparation .
Materials and methods: sixty maxillary first premolars were prepared with class II cavities. Samples were divided into three groups according to material used group A (FiltekZ250 micro hybrid). Group B(Z250xt Nano hybrid). Group C (nanocomposite Z350xt)and each group divided into two subgroups of ten teeth according to temperature of composite:
... Show MoreBioaccumulation of heavy metals in the terrestrial invertebrates in Al-Jadriyia district Baghdad- Iraq were investigated. Forth terrestrial invertebrates snails, slug, isopods, and diplopods , were selected for this study. The results showed that all invertebrate groups have the ability in accumulate considerable amounts of heavy metals. Higher levels of zinc and copper were observed in the isopods specimens, it's about ( 60.50±0.58 ) and ( 96.00±0.58 ) ppm respectively , while higher levels of lead were observed in the diplopods specimens ,it's about ( 23.00±1.15 ) ppm ,but the higher levels of both iron and cadmium were observed in snail specimens , it's about ( 590.00±1.15 ) and ( 9.50±1.15 ) ppm respectively .but the
... Show MoreMobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More