Preferred Language
Articles
/
bsj-1372
On The Queuing System M/Er/1/N
...Show More Authors

In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
An approximate solution for solving linear system of integral equation with application on "Stiff" problems
...Show More Authors

An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly

View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
On Blow-up Solutions of A Parabolic System Coupled in Both Equations and Boundary Conditions
...Show More Authors

This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.

View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Transfocation Technique to Overcome Atmospheric Scintillation Effect on a Laser Detection and Tracking System (LDTS)
...Show More Authors

Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2&lt;sup&gt;m&lt;/sup&gt;) using FPGA by exponentiation to (2&lt;sup&gt;k&lt;/sup&gt;)
...Show More Authors

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the performance of government units according to the government accounting system
...Show More Authors

Abstract

This study aims at clarifying the current performance appraisal system in government units and the extent to which they contribute to the development of the performance of these units by evaluating and measuring the performance of these units on an ongoing basis to subject their services to an assessment and measurement process in order to improve the efficiency of these units to reach their objectives efficiently and effectively. (Iraqi hospitals) by trying to determine the possibility of the government accounting system in the process of evaluating performance, through the comparison of financial performance for successive years and different hospitals using the financial and non-financial model of the evaluati

... Show More
View Publication
Crossref
Publication Date
Wed May 27 2015
Journal Name
Diyala Journal For Pure Science
Synthesis And Characterization Of Some New Metals Complexes Of [N-(3-acetylphenylcarbamothioyl)-4-methoxybenzamide]
...Show More Authors

A new ligand [N-(3-acetylphenylcarbamothioyl)-4-methoxybenzamide](MAA) was synthesized by reaction of 4-methoxybenzoylisothiocyanate with 3-aminoacetophenone,The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13CNMR spectra, some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MAA)2(H2O)2]Cl2 (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral

Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Chromosomal aberrations and N-ras activation in human larynx carcinoma cell line Hep-2.
...Show More Authors

In the present study, cytogenetic and molecular techniques were conducted to detect the chromosomal aneuploidy and the involvement of N and H genes in squamous larynx carcinoma cell line Hep-2.Our results showed that numerical and structural abnormalities were involved in larynx cancer Hep-2.The total number of chromosomes ranging from tripolyploidy in passage187to more than that in passage207.The more frequent chromosomes involved in numerical aberrations were chromosomes1,7,16,17 and 18. Structural chromosomal aberrations were also detected.Deletion of short arm was detected in chromosome 1(del 1p) and the long arm of chromosome 1(del 1q)and 6(del 6q).Gaining on short arms were also recorded in chromosomes 3(3p+) and 12(12p+).At the mole

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Iosr Journal Of Applied Chemistry (iosr-jac)
Synthesis and Characterization of new metals complexes of [N-(4- chlorobenzoylamino)-thioxomethyl]valine (cbv)
...Show More Authors

A new ligand [N-(4-chlorobenzoyl amino) -thioxomethyl] valine (cbv) is synthesized by reaction of 4- chloro benzoyl iso thio cyanate with valine acid. The ligand is Characterized by elemental analysis ,FT-IR, and 13C 1H NMR spectra, some transition metals complex of this ligand were prepared and Characterized by FTIR , UV-Visible spectra , conductivity measurement's ,magnetic susceptibility , atomic absorption and determination of molar ratio (M:L), from results obtained , the following formula [M(cbv)2] where M+2 =Mn, Fe ,Co , Ni , Cu,Zn,Cd, and Hg and the proposed molecular structure for these complexes as tetrahedral geometry, except copper complex is have square planer geometry