Preferred Language
Articles
/
7hfW8pIBVTCNdQwC08PT
The Effects of Planned Program on Nurses' Practices for Intramuscular Injection Among Pediatric
...Show More Authors

Publication Date
Sun Feb 03 2019
Journal Name
Iraqi Journal Of Physics
Study the variation of synodic month for the moon through 2000-2100
...Show More Authors

In this research study the synodic month for the moon and their
relationship with the mean anomaly for the moon orbit and date A.D
and for long periods of time (100 years), we was design a computer
program that calculates the period of synodic months, and the
coordinates of the moon at the moment of the new moon with high
accuracy. During the 100 year, there are 1236 period of synodic
months.
We found that the when New Moon occurs near perigee (mean
anomaly = 0°), the length of the synodic month at a minimum.
Similarly, when New Moon occurs near apogee (mean anomaly =
180°), the length of the synodic month reaches a maximum. The
shortest synodic month on 2053 /1/ 16 and lasted (29.27436) days.
The lo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Estimate the risk of runoff for six basins in the western plateau
...Show More Authors

The research risk of flooding on six water basins located in the eastern part of the western plateau, reached total area of the basin (22,998.9 km 2), has reached all the Basin area (basin to time 7056.1 km2 basin by 3585 km 2, Bath Alheiazi 6404 km 2, Abu beasts 544.1 km2 basin Abu Shannan 144.6 km 2, Bath Valley Faraj 5265.1 km 2), where it was specifically spatial degree of this risk by studying some of the hydrological basin transactions directly related to operations spate runoff study area and the occurrence of flood risks on the surface of ponds.

View Publication Preview PDF
Publication Date
Wed Jul 01 2015
Journal Name
Al–bahith Al–a'alami
Dependence on Media and the Formation of the Level of the Academic Elite's Knowledge concerning United Nations' Affairs (A research based on a doctoral thesis)
...Show More Authors

The UN organization is considered one of the most important organizations at the international level. It has accomplished multiple tasks and roles of many different issues and events that hit the developing and advanced world countries. It has performed a series of procedures and laws that have had an impact on ending the wars and conflicts that plagued some countries and continued for a period of time in the past. Moreover, it has improved the level of the international relations between a number of countries due to the problems and incidents took place between them. It has relied on finding solutions and treatments for humanitarian problems such as the preservation of the environment, preventing the spread of epidemics and diseases Thi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Mar 09 2026
Journal Name
Journal Of Physical Education
A comparative analysis , for some Elkinmetekih variables , in the performance of the skill (Nick shot the front reverse ) , between the players of the Iraqi team and the Egyptian , for young people in squash
...Show More Authors

View Publication
Publication Date
Mon Jan 28 2013
Journal Name
Spie Proceedings
BER performance enhancement for secure wireless communication systems based on chaotic-MIMO techniques
...Show More Authors

The growing interest in the use of chaotic techniques for enabling secure communication in recent years has been motivated by the emergence of a number of wireless services which require the service provider to provide low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. While the use of Chaotic maps can enhance security, it is seen that the overall BER performance gets degraded when compared to conventional communication schemes. In order to overcome this limitation, we have proposed the use of a combination of Chaotic modulation and Alamouti Space Time Block Code. The performance of Chaos Shift Keying (CSK) wi

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Channel state information estimation for reconfigurable intelligent surfaces based on received signal analysis
...Show More Authors

<p>Recently, reconfigurable intelligent surfaces have an increasing role to enhance the coverage and quality of mobile networks especially when the received signal level is very weak because of obstacles and random fluctuation. This motivates the researchers to add more contributions to the fields of reconfigurable intelligent surfaces (RIS) in wireless communications. A substantial issue in reconfigurable intelligent surfaces is the huge overhead for channel state information estimation which limits the system’s performance, oppressively. In this work, a newly proposed method is to estimate the angle of arrival and path loss at the RIS side and then send short information to the base station rather than huge overhe

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Int. J. Eng. Ra
Pressure Gradient Influence on MHD Flow for Generalized Burgers’ Fluid with Slip Condition
...Show More Authors

This paper presents a research for magnetohydrodynamic (MHD) flow of an incompressible generalized Burgers’ fluid including by an accelerating plate and flowing under the action of pressure gradient. Where the no – slip assumption between the wall and the fluid is no longer valid. The fractional calculus approach is introduced to establish the constitutive relationship of the generalized Burgers’ fluid. By using the discrete Laplace transform of the sequential fractional derivatives, a closed form solutions for the velocity and shear stress are obtained in terms of Fox H- function for the following two problems: (i) flow due to a constant pressure gradient, and (ii) flow due to due to a sinusoidal pressure gradient. The solutions for

... Show More
View Publication
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Machine Learning And Data Mining In Pattern Recognition
A New Strategy for Case-Based Reasoning Retrieval Using Classification Based on Association
...Show More Authors

View Publication Preview PDF
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref