Preferred Language
Articles
/
bsj-1397
New Fuzzy Normed Spaces
...Show More Authors

In this paper the research introduces a new definition of a fuzzy normed space then the related concepts such as fuzzy continuous, convergence of sequence of fuzzy points and Cauchy sequence of fuzzy points are discussed in details.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 01 2010
Journal Name
Iraqi Journal Of Physics
Determination of Skip Entry Trajectories for Space Vehicles at Circular and Super Circular Speeds
...Show More Authors

The study of entry and reentry dynamics for space vehicles is very important, particularly for manned vehicles and vehicles which is carry important devices and which can be used again. There are three types for entry dynamic, ballistics entry, glide entry and skip entry. The skip entry is used in this work for describing entry dynamics and determining trajectory. The inertia coordinate system is used to derive equations of motion and determines initial condition for skip entry. The velocity and drag force for entry vehicle, where generate it during entry into earth’s atmosphere are calculated in this work. Also the deceleration during descending and determining entry angles, velocities ratio and altitude ratio have been studied. The c

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 27 2018
Journal Name
Iraqi Journal Of Science
Properties of ~ Self-Adjoint and ~ Positive Operators in b- Hilbert Space
...Show More Authors

In this paper, we will introduce a new concept of operators in b-Hilbert space, which is respected to self- adjoint operator and positive operator. Moreover we will show some of their properties as well as the relation between them.

View Publication Preview PDF
Publication Date
Fri Oct 28 2022
Journal Name
Political Sciences Journal
Cyber influence of national security of active countries USA as pattern
...Show More Authors

Briefly the term of cyber security is a bunch of operations and procedures working on insurance and protecting the network, computer devices, the programs and data from attack and from damaging penetration, also from breaking, abstraction and disturbing in spite of the fact that the concept of cyber conflict is got widening. So, the needs arise in the state to secure cyberspace and protect it by several methods to confront the electronic intrusions and threats which is known as cyber security. Countries seek to preserve its national security in particular the United States of America after the events of September 11 ,2001. In addition, the United States follow all ways to take over cyber threats.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Assessment of Outer Space Events on Troposphere and Climate Change over Iraq
...Show More Authors

     The aim of the study is to investigate the effects of space weather on the troposphere, where our climate exists. This work is useful to give us an idea of ​​the interaction between solar activity and some meteorological parameters. The sunspot number (SSN) data were extracted from the World Data Center for the production, preservation, and dissemination of the international sunspot number (SILSO), top net solar radiation (TSR) and temperature 2 meters from the ERA5 model of the Copernicus Climate Change Service (C3S) from the Climate Data Store with 0.25 grid Resolution, providing a rich source of climate data for researchers. This study was conducted from 2008 to 2021 (solar cycle 24 and the beginning of 25) over Iraq loca

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Continuous Classical Optimal Control of Triple Nonlinear Parabolic Partial Differential Equations
...Show More Authors

    This paper  concerns with the state and proof the existence and uniqueness theorem of triple state vector solution (TSVS) for the triple nonlinear parabolic partial differential equations (TNPPDEs) ,and triple state vector equations (TSVEs), under suitable assumptions. when the continuous classical triple control vector (CCTCV) is given by using the method of Galerkin (MGA). The existence theorem of a continuous classical optimal triple control vector (CCTOCV) for the continuous classical optimal control governing by the TNPPDEs under suitable conditions is proved.  

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
On The Normality Set of Linear Operators
...Show More Authors

            In this paper, the Normality set  will be investigated. Then, the study highlights some concepts properties and important results. In addition, it will prove that every operator with normality set has non trivial invariant subspace of  .

 

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Oct 31 2018
Journal Name
Iraqi Journal Of Science
Evolutionary Based Set Covers Algorithm with Local Refinement for Power Aware Wireless Sensor Networks Design
...Show More Authors

Establishing coverage of the target sensing field and extending the network’s lifetime, together known as Coverage-lifetime is the key issue in wireless sensor networks (WSNs). Recent studies realize the important role of nature-inspired algorithms in handling coverage-lifetime problem with different optimization aspects. One of the main formulations is to define coverage-lifetime problem as a disjoint set covers problem. In this paper, we propose an evolutionary algorithm for solving coverage-lifetime problem as a disjoint set covers function. The main interest in this paper is to reflect both models of sensing: Boolean and probabilistic. Moreover, a heuristic operator is proposed as a local refinement operator to improve the quality

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Odd Fibonacci edge irregular labeling for some trees obtained from subdivision and vertex identification operations
...Show More Authors

Let G be a graph with p vertices and q edges and  be an injective function, where k is a positive integer. If the induced edge labeling   defined by for each is a bijection, then the labeling f is called an odd Fibonacci edge irregular labeling of G. A graph which admits an odd Fibonacci edge irregular labeling is called an odd Fibonacci edge irregular graph. The odd Fibonacci edge irregularity strength ofes(G) is the minimum k for which G admits an odd Fibonacci edge irregular labeling. In this paper, the odd Fibonacci edge irregularity strength for some subdivision graphs and graphs obtained from vertex identification is determined.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Depositional Framework and Stratigraphic Sequence of Early – Middle Miocene succession in Balad and East Baghdad oil fields, Central Iraq
...Show More Authors

     This study deals with microfacies analysis, diagenetic facies, environmental interpretations related to sequence stratigraphy for Early – Middle Miocene in selected wells within Balad (Ba-X) and East Baghdad (EB-Z) oil fields.

Seven major microfacies were recognized in the successions of the study wells, these facies were used to recognize six facies association (depositional environments) within the study oil fields: deep marine, toe of slope, open marine, restricted interior platform, evaporitic interior platform and brackish interior platform. The facies associations interpreted were based on texture and obtainable fauna.

The Early - Middle Miocene succession was deposited during two depositional cycles as a t

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Constraints Optimal Classical Continuous Control Vector Problem for Quaternary Nonlinear Hyperbolic System
...Show More Authors

This paper is concerned with the quaternary nonlinear hyperbolic boundary value problem (QNLHBVP) studding constraints quaternary optimal classical continuous control vector (CQOCCCV), the cost function (CF), and the equality and inequality quaternary state and control constraints vector (EIQSCCV). The existence of a CQOCCCV dominating by the QNLHBVP is stated and demonstrated using the Aubin compactness theorem (ACTH) under appropriate hypotheses (HYPs). Furthermore, mathematical formulation of the quaternary adjoint equations (QAEs) related to the quaternary state equations (QSE) are discovere  so as its weak form (WF) . The directional derivative (DD) of the Hamiltonian (Ham) is calculated. The necessary and sufficient conditions for

... Show More
View Publication Preview PDF
Crossref