Preferred Language
Articles
/
jcoeduw-387
Orphans and Families of Martyrs of Terrorism Expert System-OFMTES
...Show More Authors

The increasing number of orphans and their organizations and institutes in our community makes it increasingly important to design and develop an expert system that supports decisions concerning orphans and their families. This system can be used by any orphans organization to facilitate its work.
The proposed work is designed to manage the Orphans and Families of Martyrs of Terrorism Expert System (OFMTES) by registry all information about all orphans to display mostly orphan deserves bill, data is entered for each orphan, and with each entry a counter is increased according to this input information; the output result represents the score for that orphan. Different orphans have different scores. Coloring is used to know the degree of orphans merit; that is, when background color of that text is red this means that the orphan does not deserve bill, when the color is yellow this means that the orphan deserves bill but in little ratio, when the color is blue this means that the orphan deserves bill but in more ratio from blue, and when the color is green this orphan is mostly deserves bill.
The program was implemented using Microsoft office access 2003 and visual basic programming language, and can be executed using Pentium two or more computer.
Keywords: Expert system, knowledge engineering, decision support system, Knowledge Representation, Information Technology and Artificial Intelligence.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
A Study of Some Physical Properties for Binary System of Cyclohexane with n-decane and 1-pentanol at Different Temperatures
...Show More Authors

mixtures of cyclohexane + n-decane and cyclohexane + 1-pentanol have been measured at 298.15, 308.15, 318.15, and 328.15 K over the whole mole fraction range. From these results, excess molar volumes, VE , have been calculated and fitted to the Flory equations. The VE values are negative and positive over the whole mole fraction range and at all temperatures. The excess refractive indices nE and excess viscosities ?E have been calculated from experimental refractive indices and viscosity measurements at different temperature and fitted to the mixing rules equations and Heric – Coursey equation respectively to predict theoretical refractive indices, we found good agreement between them for binary mixtures in this study. The variation of th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Photochemistry And Photobiology B: Biology
High efficiency of Ag0 decorated Cu2MoO4 nanoparticles for heterogeneous photocatalytic activation, bactericidal system, and detection of glucose from blood sample
...Show More Authors

View Publication
Scopus (63)
Crossref (62)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Applied Thermal Engineering
Experimental evaluation of thermal efficiency, electrical efficiency, and power production of low-concentrating photovoltaic-thermal system with micro-jet channel
...Show More Authors

The efficient behavior of a low-concentrating photovoltaic-thermal system with a micro-jet channel (LCPV/T-JET) and booster mirror reflector is experimentally evaluated here. Micro-jets promote the thermal management of PV solar cells by implementing jet water as active cooling, which is still in the early stages of development. The booster mirror reflector concentrates solar irradiance into solar cells and improves the thermal, electrical, and combined efficiencies of the LCPV/T-JET system. The LCPV/T-JET system was tested under ambient weather conditions in the city of Bangi, Selangor, Malaysia, and all data was recorded between 10:00 a.m. and 4:00 p.m. Parametric studies were conducted to compare the performance of the LCPV/T-JET system

... Show More
View Publication
Scopus (19)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Apr 14 2019
Journal Name
Political Sciences Journal
The political system in North Korea
...Show More Authors

النظام السياسي في كوريا الشمالة

View Publication
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Computers And Electrical Engineering
Automatic illness prediction system through speech
...Show More Authors

View Publication
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
AXIAL FAN BEARING SYSTEM VIBRATION ANALYSIS
...Show More Authors

Rotating fan shaft system was investigated experimentally and theoretically to study its dynamic performance. The type of oil used for the bearing was taken in consideration during the experimental program .Three types of oil were used, SAE 40, SAE 50 and degraded oil. During the experiments, the fan blades stagger angle was changed through angles (20˚, 30˚, 40˚, and 50˚). The shaft rotational speed also changed in the range of (0-3000 rpm). All these parameters have investigated for two cases (balanced and unbalanced fan). The performance parameters of the fan were found experimentally by measuring the fan, volume flow rate, Reynolds and Strouhal numbers, efficiency and pressure head. Analytical part was also represented to prepare

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
E3s Web Of Conferences
Dewatering System Control by MATLAB Software
...Show More Authors

The aim was to design a MATLAB program to calculate the phreatic surface of the multi-well system and present the graphical shape of the water table drawdown induced by water extraction. Dupuit’s assumption is the base for representing the dewatering curve. The program will offer the volume of water to be extracted, the total number of wells, and the spacing between them as well as the expected settlement of soil surrounding the dewatering foundation pit. The dewatering well arrangement is required in execution works, and it needs more attention due to the settlement produced from increasing effective stress.

View Publication Preview PDF
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
Polar structure in the international system
...Show More Authors

Conclusion The observation of the phenomenon of structural evolution of the international system and its instability on a particular situation, by its transition from unipolar to polarity to bipolarism and then to unilateralism in the early 1990s led by the United States, and to the present moment, To say that the structure by which the hierarchy of superpowers or the regime is directed in terms of its various capacities that qualify it, and with the consent of the rest of the States directing the regime to lead and lead the world's first place, has no direct relation to the stability of this system, I hope other more influential in its stability. The structure of the new international order will be completely different in terms of the r

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Intrusion Detection System Techniques A Review
...Show More Authors

With the high usage of computers and networks in the current time, the amount of security threats is increased. The study of intrusion detection systems (IDS) has received much attention throughout the computer science field. The main objective of this study is to examine the existing literature on various approaches for Intrusion Detection. This paper presents an overview of different intrusion detection systems and a detailed analysis of multiple techniques for these systems, including their advantages and disadvantages. These techniques include artificial neural networks, bio-inspired computing, evolutionary techniques, machine learning, and pattern recognition.