This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.
This study was carried out in epidemically field with common reed (Phragmites communis Trin.) plants in the Nassiriah cityThiQur governorate ,during 2009/2010 to investigate the influence of plant growth regulator gibberellin (GA3)and cytokinin (CK) in increasing the efficacy of glyphosate and Fluazifop-butyl in common reed control . Factorial experiment in RCBD was used with three replications in tow Factors . Glyphosate 3500mg .l־¹ gave the higher mean of injury score of common reed and lower mean of common reed shoots , shoots dry weight and rhizome dry weight(3.59,22.01 shoot /0.5m² ,0.57Kg / 0.5m² and 250.50gm /0,5m² ),respectively. All plant growth regulators gaves the higher means of common reed shoots and rhizome dry weight com
... Show MoreBiodiesel production process was attracted more attention recently due to the surplus quantity of glycerol (G) as a byproduct from the process. Glycerol Utilization must take in to consideration to fix this issue also, to ensure biodiesel industry sustainability. Highly amount of Glycerol converted to more benefit material Glycerol carbonate (GC) was one of the most allurement compound derived from glycerol by transesterification of glycerol with dimethyl carbonate (DMC). Various parameters have highly impact on transesterification was investigated like catalyst loading (1-5) %wt., molar ratio of DMC: glycerol (5:1 – 1:1), reaction time (30 - 150) min and temperature (40 – 80) ᴼC. The Optimum glycerol carbonate yie
... Show MoreThis study was conducted in Animal Resources Department , College of Agriculture to estimate the effect of chemical and biological treatments to improve the nutritive value of poor quality roughages ( corn cobs and wild reed ) . The feeds were treated chemically with 4% NaoH solution ,whereas Aspergillus niger was used to ferment corn cobs and wild reed samples . The chemical analysis showed that protein percentages of corn cobs and wild reed was increased significantly (P<0.05) from 6.05% to 10.51% and 17.70% and from 3.10 %to 6.50% and 9.96% for both chemical and biological treatments respectively. The crude fiber percentages decreased significantly (P<0.05) from 29.19% and 26.10% to 23.60% and 20.10% for chemical treatment and was 20
... Show MoreThis paper examines a new nonlinear system of multiple integro-differential equations containing symmetric matrices with impulsive actions. The numerical-analytic method of ordinary differential equations and Banach fixed point theorem are used to study the existence, uniqueness and stability of periodic solutions of impulsive integro-differential equations with piecewise continuous functions. This study is based on the Hölder condition in which the ordering , and are real numbers between 0 and 1.
As we live in the era of the fourth technological revolution, it has become necessary to use artificial intelligence to generate electric power through sustainable solar energy, especially in Iraq and what it has gone through in terms of crises and what it suffers from a severe shortage of electric power because of the wars and calamities it went through. During that period of time, its impact is still evident in all aspects of daily life experienced by Iraqis because of the remnants of wars, siege, terrorism, wrong policies ruling before and later, regional interventions and their consequences, such as the destruction of electric power stations and the population increase, which must be followed by an increase in electric power stations,
... Show MoreThe proposed algorithm that is presented in this paper is based on using the principle of texts translation from one language to another, but I will develop this meaning to cipher texts by using any electronic dictionary as a tool of ciphering based on the locations of the words that text contained them in the dictionary. Then convert the text file into picture file, such as BMP-24 format. The picture file will be transmitted to the receiver. The same algorithm will be used in encryption and decryption processing in forward direction in the sender, and in backward direction in the receiver. Visual Basic 6.0 is used to implement the proposed cryptography algorithm.
Steganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreVideo copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various
... Show MoreA (b,t)-blocking set B in PG(2,q) is set of b points such that every line of PG(2,q) intersects B in at least t points and there is a line intersecting B in exactly t points. In this paper we construct a minimal (b,t)-blocking sets, t = 1,2,3,4,5 in PG(2,5) by using conics to obtain complete arcs and projective codes related with them.