This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
The statistical distributions study aimed to obtain on best descriptions of variable sets phenomena, which each of them got one behavior of that distributions . The estimation operations study for that distributions considered of important things which could n't canceled in variable behavior study, as result this research came as trial for reaching to best method for information distribution estimation which is generalized linear failure rate distribution, throughout studying the theoretical sides by depending on statistical posteriori methods like greatest ability, minimum squares method and Mixing method (suggested method).
The research
... Show MoreBackround: The Solid state fermentation has several advantage including absence of free water , reduced volume of production media utilized for high products and the relatively low costs of production.
Methods: Thirty local isolates of soil obtained from Genetic Engneering and Biotechnology Institute. Nutrient agar was used to growth strains examination to antibacterial agent and Wheat bran and fish meal were used in combination (0-100%of each )and divided in 10 gm lost /flask . Each flask is inoculated with different numbers of Streptomyces spores and incubated for 5 days at 28°C, then the supernet was extracted and were assayed as antibacterial
Results: The ability of 30 local isolates of Streptomyc
The railways network is one of the huge infrastructure projects. Therefore, dealing with these projects such as analyzing and developing should be done using appropriate tools, i.e. GIS tools. Because, traditional methods will consume resources, time, money and the results maybe not accurate. In this research, the train stations in all of Iraq’s provinces were studied and analyzed using network analysis, which is one of the most powerful techniques within GIS. A free trial copy of ArcGIS®10.2 software was used in this research in order to achieve the aim of this study. The analysis of current train stations has been done depending on the road network, because people used roads to reach those train stations. The data layers for this st
... Show MoreThis research deals with the motives of the use of Facebook by elderly people and the achieved needs, which leads the researcher to ask an important question: why an old persons use Facebook and are the achieved needs through which they got? The research aims to find out the habits and patterns of using Facebook by old men and stands on the main motives of the elderly in their use of Facebook. It also identifies the most prominent needs that have been made for the elderly as a result of their use of Facebook.
The research is a descriptive one in which the researcher uses survey method to achieve the desired goals. The researcher has chosen a group of old men from Diyala province. The total sample number is about
... Show MoreOne of the primary problems in internet is security, mostly when computer utilization is increasing in all social and business areas. So, the secret communications through public and private channels are the major goal of researchers. Information hiding is one of methods to obtain a security communication medium and protecting the data during transmission.
This research offers in a new method using two levels to hide, the first level is hiding by embedding and addition but the second level is hiding by injection. The first level embeds a secret message in one bit in the LSB in the FFT and the addition of one kashida. Subtraction of two random images (STRI) is RNG to find positions for hiding within the text. The second level is the in
The aim of this paper is to present a weak form of -light functions by using -open set which is -light function, and to offer new concepts of disconnected spaces and totally disconnected spaces. The relation between them have been studied. Also, a new form of -totally disconnected and inversely -totally disconnected function have been defined, some examples and facts was submitted.
In this research two algorithms are applied, the first is Fuzzy C Means (FCM) algorithm and the second is hard K means (HKM) algorithm to know which of them is better than the others these two algorithms are applied on a set of data collected from the Ministry of Planning on the water turbidity of five areas in Baghdad to know which of these areas are less turbid in clear water to see which months during the year are less turbid in clear water in the specified area.
Background: Thalassemia is a hereditary anemia resulting from defects in hemoglobin production. ?- thalassemia caused by decrease in the production of ?- globin chains affect multiple organs and is associated with cranio-oro-facial deformity which include prominent cheek bones and protrusive premaxilla with depression of the nasal bridge often referred to as “rodent or chip-munk face” with small mandible and Cl.II skeletal relationship. This study aimed to investigate cephalometric craniofacial parameters (skeletal) of ?- thalassemic major patients by using computed tomography and to compare findings with a group of healthy patients in the same age group. Subject, Materials and Method: The study included (40) patients with ?- thalassemi
... Show MoreJournal of Physics: Conference Series PAPER • THE FOLLOWING ARTICLE ISOPEN ACCESS Estimate the Rate of Contamination in Baghdad Soils By Using Numerical Method Luma Naji Mohammed Tawfiq1, Nadia H Al-Noor2 and Taghreed H Al-Noor1 Published under licence by IOP Publishing Ltd Journal of Physics: Conference Series, Volume 1294, Issue 3 Citation Luma Naji Mohammed Tawfiq et al 2019 J. Phys.: Conf. Ser. 1294 032020 DOI 10.1088/1742-6596/1294/3/032020 DownloadArticle PDF References Download PDF 135 Total downloads 88 total citations on Dimensions. Turn on MathJax Share this article Share this content via email Share on Facebook (opens new window) Share on Twitter (opens new window) Share on Mendeley (opens new window) Hide article and author
... Show More