In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.
An approximate solution of the liner system of ntegral cquations fot both fredholm(SFIEs)and Volterra(SIES)types has been derived using taylor series expansion.The solusion is essentailly
This paper is concerned with the blow-up solutions of a system of two reaction-diffusion equations coupled in both equations and boundary conditions. In order to understand how the reaction terms and the boundary terms affect the blow-up properties, the lower and upper blow-up rate estimates are derived. Moreover, the blow-up set under some restricted assumptions is studied.
Atmospheric transmission is disturbed by scintillation, where scintillation caused more beam divergence. In this work target image spot radius was calculated in presence of atmospheric scintillation. The calculation depend on few relevant equation based on atmospheric parameter (for Middle East), tracking range, expansion ratio of applied beam expander's, receiving unit lens F-number, and the laser wavelength besides photodetector parameter. At maximum target range Rmax =20 km, target image radius is at its maximum Rs=0.4 mm. As the range decreases spot radius decreases too, until the range reaches limit (4 km) at which target image spot radius at its minimum value (0.22 mm). Then as the range decreases, spot radius increases due to geom
... Show More<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami
... Show MoreMultiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex
... Show MoreAbstract
This study aims at clarifying the current performance appraisal system in government units and the extent to which they contribute to the development of the performance of these units by evaluating and measuring the performance of these units on an ongoing basis to subject their services to an assessment and measurement process in order to improve the efficiency of these units to reach their objectives efficiently and effectively. (Iraqi hospitals) by trying to determine the possibility of the government accounting system in the process of evaluating performance, through the comparison of financial performance for successive years and different hospitals using the financial and non-financial model of the evaluati
... Show MoreA new ligand [N-(3-acetylphenylcarbamothioyl)-4-methoxybenzamide](MAA) was synthesized by reaction of 4-methoxybenzoylisothiocyanate with 3-aminoacetophenone,The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13CNMR spectra, some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MAA)2(H2O)2]Cl2 (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg),the proposed geometrical structure for all complexes were octahedral
In the present study, cytogenetic and molecular techniques were conducted to detect the chromosomal aneuploidy and the involvement of N and H genes in squamous larynx carcinoma cell line Hep-2.Our results showed that numerical and structural abnormalities were involved in larynx cancer Hep-2.The total number of chromosomes ranging from tripolyploidy in passage187to more than that in passage207.The more frequent chromosomes involved in numerical aberrations were chromosomes1,7,16,17 and 18. Structural chromosomal aberrations were also detected.Deletion of short arm was detected in chromosome 1(del 1p) and the long arm of chromosome 1(del 1q)and 6(del 6q).Gaining on short arms were also recorded in chromosomes 3(3p+) and 12(12p+).At the mole
... Show MoreA new ligand [N-(4-chlorobenzoyl amino) -thioxomethyl] valine (cbv) is synthesized by reaction of 4- chloro benzoyl iso thio cyanate with valine acid. The ligand is Characterized by elemental analysis ,FT-IR, and 13C 1H NMR spectra, some transition metals complex of this ligand were prepared and Characterized by FTIR , UV-Visible spectra , conductivity measurement's ,magnetic susceptibility , atomic absorption and determination of molar ratio (M:L), from results obtained , the following formula [M(cbv)2] where M+2 =Mn, Fe ,Co , Ni , Cu,Zn,Cd, and Hg and the proposed molecular structure for these complexes as tetrahedral geometry, except copper complex is have square planer geometry