Preferred Language
Articles
/
1xeLMI8BVTCNdQwCQ1_I
Finding the Exact Solution of Kepler’s Equation for an Elliptical Satellite Orbit Using the First Kind Bessel Function
...Show More Authors

     In this study, the first kind Bessel function was used to solve Kepler equation for an elliptical orbiting satellite. It is a classical method that gives a direct solution for calculation of the eccentric anomaly. It was solved for one period from (M=0-360)° with an eccentricity of (e=0-1) and the number of terms from (N=1-10). Also, the error in the representation of the first kind Bessel function was calculated. The results indicated that for eccentricity of (0.1-0.4) and (N = 1-10), the values of eccentric anomaly gave a good result as compared with the exact solution. Besides, the obtained eccentric anomaly values were unaffected by increasing the number of terms (N = 6-10) for eccentricities (0.8 and 0.9). The Bessel function's solution appeared to be close to the exact solution for eccentricity of 1 and more than 10 number of terms. Finally, the representation of the first kind Bessel function J1(x) was closer to the exact representation only for eccentricity 0.5 and (N=1-10).

Scopus Crossref
View Publication
Publication Date
Tue Mar 01 2022
Journal Name
The International Journal Of Nonlinear Analysis And Applications
Improved optimality checkpoint for decision making by using the sub-triangular form
...Show More Authors

Decision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 04 2026
Journal Name
Journal Wlkalam
Earthquakes in the Holy Qur’an and the Hadith of the Noble Prophet, an intellectual approach
...Show More Authors

Earthquakes in the Holy Qur’an and the Hadith of the Noble Prophet, an intellectual approach

View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
A Study on the Stability of Different Frusemide Liquid Dosage Formulas: Oral Solution, Syrup, Elixir, Suspension and Emulsion
...Show More Authors

The present study aim at preparing frusemide in liquid form suitable for oral use. This is achieved through preparing different liquid forms of frusemide. The frusemide liquid is prepared in the following forms: oral solution, syrup and elixir with intensity of 1, 0.4 and 0.8% weight /volume respectively and in combination with potassium carbonate, polysorbate 80, alcohol and phosphate buffer solution of pH8 to dissolve the frusemide in the above mentioned forms. The different forms of the prepared medicine have been stored in glass bottles that can provide protection against light and at 40, 50, 600C for four months. Besides the pH has been checked to decide the period of validity. The results show that the expiration date of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Mean-field Solution of the mixed spin-1 and spin-5/2Ising system with different single-ion anisotropies
...Show More Authors

The mixed-spin ferrimagnetic Ising system consists of two-dimensional sublattices A and B with spin values and respectively .By used the mean-field approximation MFA of Ising model to find magnetism( ).In order to determined the best stabile magnetism , Gibbs free energy employ a variational method based on the Bogoliubov inequality .The ground-state (Phase diagram) structure of our system can easily be determined at , we find six phases with different spins values depend on the effect of a single-ion anisotropies .these lead to determined the second , first orders transition ,and the tricritical points as well as the compensation phenomenon .

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Advances In Science, Technology & Innovation
Producing a Three Dimensional Model for the University of Baghdad Campus Using GIS Environment
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Oct 19 2025
Journal Name
Lecture Notes In Networks And Systems
The Effect of Skill and Physical Exercises Using Smart Virtual Reality for Volleyball Players
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Mar 02 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Using WO3/AlPO4 as a solid catalyst for the transesterification of waste edible oils
...Show More Authors

AlPO4 catalysts supported with WO3 were prepared by impregnating the catalysts with ammonium metatungstate. The catalysts were checked by X-ray Diffraction (XRD), AFM, and SEM; also, the catalysts analysis was done by X-Ray (EDX). Finally, the N2 adsorption-desorption was used to measure the pore volume and surface area of the catalyst. The prepared catalyst has a surface area of 185.83 m2/g, pore volume of 0.645 cm3/g at a calcination temperature of 500°C for 3 hrs, and particle size of AlPO4 with an average of 35.36 nm. Transesterification of edible oil using WO3/AlPO4 was performed, it was observed that WO3/AlPO4 catalysts give high conversion of edible oil, and this is attributed to the high surface area, smaller particle size, and the

... Show More
View Publication Preview PDF
Crossref