This paper is interested in certain subclasses of univalent and bi-univalent functions concerning to shell- like curves connected with k-Fibonacci numbers involving modified Sigmoid activation function θ(t)=2/(1+e^(-t) ) ,t ≥0 in unit disk |z|<1 . For estimating of the initial coefficients |c_2 | , |c_3 |, Fekete-Szego ̈ inequality and the second Hankel determinant have been investigated for the functions in our classes.
The present study involves experimental analysis of the modified Closed Wet Cooling Tower (CWCT) based on first and second law of thermodynamics, to gain a deeper knowledge in this important field of engineering in Iraq. For this purpose, a prototype of CWCT optimized by added packing under a heat exchanger was designed, manufactured and tested for cooling capacity of 9 kW. Experiments are conducted to explore the effects of various operational and conformational parameters on the towers thermal performance. In the test section, spray water temperature and both dry bulb temperature and relative humidity of air measured at intermediate points of the heat exchanger and packing. Exergy of water and air were calculated by applying the exergy
... Show MoreSome physical properties enthalpy (?H), entropy (?s), free energy (?G),capacities(?cp?) and Pka values) for valine in dimethyl foramideover the temperature range 293.15-318.15K, were determined by direct conductance measurements. The acid dissociation at six temperature was examined at solvent composition x2) involving 0.141 of dimethyl foramide . As results, calculated values have been used to determine the dissociation constant and the associated thermodynamic function for the valine in the solvent mixture over temperatures in the range 293.15-318.15 k. The Pka1, and Pka2 were increased with increasing temperature.
Abstract:
The internal audit is considered the safety valve for senior management in all institutions. It aims to protect property, and raise the efficiency and effectiveness of the administrative performance, by following up on compliance with laws and instructions and the application of regulations in a way that increases the administrative performance of the department. The internal audit is possible to determine Weaknesses or imbalances in the administrative performance. To achieve this goal, an analytical descriptive methodology was adopted. The Baghdad Health Department / Al-Rosana was considered as society for this s
... Show MoreThe transfer function model the basic concepts in the time series. This model is used in the case of multivariate time series. As for the design of this model, it depends on the available data in the time series and other information in the series so when the representation of the transfer function model depends on the representation of the data In this research, the transfer function has been estimated using the style nonparametric represented in two method local linear regression and cubic smoothing spline method The method of semi-parametric represented use semiparametric single index model, With four proposals, , That the goal of this research is comparing the capabilities of the above mentioned m
... Show MoreIn this study was undertaken frish fish such as Bigeye Ilisha megaloptera, Nematalos nasus, Suboor Hilsha ilisha and Carp Cyprinus carpio. they were purchased from local marketes in Basrah, Oil was extracted by a solvent extraction method on low temperature. And the level of oil obtiened about (6.08; 10.72; 13.52 and 5.61)% for Bigeye, Jaffout, Suboor and Carp. the Crud oils were compared with vegetable oil (olive oil) and animal fat (tial fat mutton).
The extracted oil from fresh complete fishs with compared oils intraed on pharmacological system through packed in capsul with and with out garlic`s extract. this system analysis with chemical tests.
Results were analyzed statistically by using the SPSS program with using (CRD)
Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis
... Show MoreThis paper tries to understand the poetic reference in the images of woman, she-camel, horse and their manifestations in Tarafah-ibnulAbd's poetry. There has got my attention the fact that these three images have their own distinct taste which is characterised by a clear rhythm, let alone the lively nature that is filled with liveliness and activity to be in harmony with the poet's youth. For these three images represented the best manifestations of his psychological and artistic poetics. The paper adopts an artistic analysis to arrive at the psychological aspects of these experiences-the woman, the she-camel, and the horse- and to understand the functions of their images and symbolic reference.