The role of the ABC system in determining the costs of services in Iraqi banks
This study explains the effect of non-thermal (cold) plasma on wound of diabetic rats by (FE-DBD) system, 3cm probe diameter is used. The output power was ranged from (12-20) W. The effect of non-thermal plasma on wounds of a diabetic was observed with different exposure durations (20,30) sec., the plasma exposure duration decreases the sugar level in blood and the diameter of the wound. These results indicate the cold plasma can be used to enhance the insulin level (i.e., blood sugar) and wounds treatment.
In this paper, we employ the maximum likelihood estimator in addition to the shrinkage estimation procedure to estimate the system reliability (
The insulation system of a machine coil includes several layers made of materials with different characteristics. The effective insulation design of machine coils, especially in the machine end winding, depends upon an accurate model of the stress grading system. This paper proposes a modeling approach to predict the transient overvoltage, electric field, and heat generation in machine coils with a stress grading system, considering the variation of physical properties in the insulation layers. A non-uniform line model is used to divide the coil in different segments based on material properties and lengths: overhang, stress grading and slot. The cascaded connection of chain matrices is used to connect segments for the representation of the
... Show MoreThe topic area of that’s paper dealing with regionalism hegemony upon ruling affairs and political life in Tunisia, this phenomena had historical origins, even before region of French occupation in 1881, after independence, the regionalism domination was practice and normal, the political system justified it's with many causes, like level of education, connection with Western civilization, enlighten intelligent, economic conditions in coast region and North of Tunisia compared with the South, also the role of President Bourqiba as founder of Modern Tunisia, he was from Monster (North of country) which was dominated as charismatic leader dedicate the regionalism domination through decades, yet after revolution in 2011, little changes ha
... Show MoreIn Iraq most of the small buildings deployed a conventional air conditioning technology which typically uses electrically driven compressor systems which exhibits several clear disadvantages such as high energy consumption, high electricity at peak loads. In this work a thermal performance of air conditioning system combined with a solar collector is investigated theoretically. The hybrid air conditioner consists of a semi hermetic compressor, water cooled shell and tube condenser, thermal expansion valve and coil with tank evaporator. The theoretical analysis included a simulation for the solar assisted air-conditioning system using EES software to analyze the effect of different parameters on the power consumption of c
... Show MoreThe mark at the Children's Theater did not receive as much attention as in the adult theater, despite the great attention given to its visual system, but some of the directors of the Children's Theater approached the application of the same system of marking in the adult theater, without limiting a certain mechanism that identifies the mechanisms of mark operation and the modalities of its transformation in the visual display system, which called on the researcher to shed light in this study on the scientific shift in the visual display system and its functions in the children's theater. The researcher formulated a title for his research (the mark transformation of the visual display system in the chi
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show More