Preferred Language
Articles
/
bsj-1024
Magic square
...Show More Authors

In this paper we introduce two Algorithms, the first Algorithms when it is odd order and how we calculate magic square and rotation for it. The second Algorithms when it be even order and how to find magic square and rotation for it.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Al-dhad Book Store
Multivariate Analysis - First Edition
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. Many solved examples are intended in this book, in addition to a variety of unsolved relied pro

... Show More
Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Direct method for Solving Nonlinear Variational Problems by Using Hermite Wavelets
...Show More Authors

In this work, we first construct Hermite wavelets on the interval [0,1) with it’s product, Operational matrix of integration 2^k M×2^k M is derived, and used it for solving nonlinear Variational problems with reduced it to a system of algebric equations and aid of direct method. Finally, some examples are given to illustrate the efficiency and performance of presented method.

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 04 2023
Journal Name
Baghdad Science Journal
Nordhaus-Gaddum Type Relations on Open Support Independence Number of Some Path Related Graphs Under Addition and Multiplication
...Show More Authors

In this paper, Nordhaus-Gaddum type relations on open support independence number of some derived graphs of path related graphs under addition and multiplication are studied.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Discharge Coefficient of Contracted Rectangular Sharp-Crested Weirs, an Experimental Study
...Show More Authors

An experimental study is made here to investigate the discharge coefficient for contracted rectangular Sharp crested weirs. Three Models are used, each with different weir width to flume width ratios (0.333, 0.5, and 0.666). The experimental work is conducted in a standard flume with high-precision head and flow measuring devices. Results are used to find a dimensionless equation for the discharge coefficient variation with geometrical, flow, and fluid properties. These are the ratio of the total head to the weir height, the ratio of the contracted weir width to the flume width, the ratio of the total head to the contracted width, and Reynolds and Weber numbers. Results show that the relationship between the discharge co

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Efficient Algorithm for Fuzzy Linear Fractional Programming Problems via Ranking Function
...Show More Authors

In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Minimum Neighborhood Domination of Split Graph of Graphs
...Show More Authors

Let  be a non-trivial simple graph. A dominating set in a graph is a set of vertices such that every vertex not in the set is adjacent to at least one vertex in the set. A subset  is a minimum neighborhood dominating set if  is a dominating set and if for every  holds. The minimum cardinality of the minimum neighborhood dominating set of a graph  is called as minimum neighborhood dominating number and it is denoted by  . A minimum neighborhood dominating set is a dominating set where the intersection of the neighborhoods of all vertices in the set is as small as possible, (i.e., ). The minimum neighborhood dominating number, denoted by , is the minimum cardinality of a minimum neighborhood dominating set. In other words, it is the

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Journal Of The College Of Education For Women
Schema Theory and Text- worlds: A Cognitive Stylistic Analysis of Selected Literary Texts
...Show More Authors

Cognitive stylistics also well-known as cognitive poetics is a cognitive approach to language. This study aims at examining literary language by showing how Schema Theory and Text World Theory can be useful in the interpretation of literary texts. Further, the study attempts to uncover how readers can connect between the text world and the real world. Putting it differently, the study aims at showing how the interaction between ‘discourse world’ and ‘text world’. How readers can bring their own experience as well as their background knowledge to interact with the text and make interpretive connections.       

Schema and text world theories are useful tools in cognitive stylistic stud

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Research Octane Number Improvement of Iraqi Gasoline by Adsorption of n-Paraffins Using Zeolite Molecular Sieves
...Show More Authors

This study focused on the improvement of the quality of gasoline and enhancing its octane number by the reduction of n-paraffins using zeolite 5A. This study was made using batch and continuous mode. The parameters which affected the n-paraffin removal efficiency for each mode were studied. Temperature (30 and 40 ˚C) and mixing time up to 120 min for different amounts of zeolite ranging (10-60 g) were investigated in a batch mode. A maximum removal efficiency of 64% was obtained using 60 g of zeolite at 30 ˚C after a mixing time 120 min. The effect of feed flow rate (0.3-0.8 l/hr) and bed height (10-20 cm) were also studied in a continuous mode. The equilibrium isotherm study was made using different amounts of zeolite (2-20 g) and the

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More