Preferred Language
Articles
/
bsj-2018
Deriving the Composite Simpson Rule by Using Bernstein Polynomials for Solving Volterra Integral Equations
...Show More Authors

In this paper we use Bernstein polynomials for deriving the modified Simpson's 3/8 , and the composite modified Simpson's 3/8 to solve one dimensional linear Volterra integral equations of the second kind , and we find that the solution computed by this procedure is very close to exact solution.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Applied Sciences
Improvement of Mechanical Welding Properties by using Induced Harmonic Vibration
...Show More Authors

View Publication
Scopus (15)
Crossref (15)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Desalination And Water Treatment
Reducing endotoxin from dialysis water by using different disinfection processes
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design of Truncated Hyperboloid Solar Concentrator by Using Zemax Program
...Show More Authors

     A hyperboloid solar concentrator (HSC) was designed with a truncation angle side to the entrance aperture by simulation in the Zemax Optical Design software. The (HSC) has a wide exposure range to solar radiation due to the relatively large entrance aperture. The design consists of an entrance aperture facing the sun to obtain the largest possible amount of solar radiation, and a small exit aperture compared to the entrance aperture whose mission is to receive solar radiation after it enters the entrance aperture and reflects it from the inner reflective walls of the (HSC). In the exit aperture, there is a detector to measure the number of rays incident on it, which is a measure of the optical efficiency of the s

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Effect of Laser Shock Peening on the Fatigue Behavior and Mechanical Properties of Composite Materials
...Show More Authors

In this study, Laser Shock Peening (LSP) effect on the polymeric composite materials has been investigated experimentally. Polymeric composite materials are widely used because they are easy to fabricate and have many attractive features. Unsaturated polyester resin as a matrix was selected and Aluminum powder with micro particles as a reinforcement material was used with different volume fraction (2.5%, 5% and 7.5%). Hand lay-up process was used for preparation the composites. Fatigue test with constant amplitude with stress ratio (R =-1) was carried out before and after LSP process with two levels of energy (1Joule and 2Joule). The result showed an increase in the endurance strength of 25.448% at 7.5% volume fraction when peened is 1J

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Applied Research Journal
Experimental Study of the Behavior of Composite Concrete Castellated Steel Beams Subjected to Pure Bending
...Show More Authors

The aim of this study is to investigate the behavior of composite castellated beam in which the concrete slab and steel beam connected together with headed studs shear connectors. Four simply supported composite beams with various degree of castellation were tested under two point static loads. One of these beams was built up using standard steel beam, i.e. without web openings, to be a reference beam. The other three beams were fabricated from the same steel I-section with various three castellation ratios, (25, 35, and 45) %. In all beams the concrete slab has the same section and properties. Deflection at mid span of all beams was measured at each 10 kN load increment. The test results show that the castellation process leads to

... Show More
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Inventory control by using Fuzzy set theory An Applied Research at the Baghdad Soft Drinks Company
...Show More Authors

The production companies in the Iraqi industry environment facing many of the problems related to the management of inventory and control In particular in determining the quantities inventory that should be hold it. Because these companies  adoption on personal experience and some simple mathematical methods which lead to the identification of inappropriate quantities of inventory.

       This research aims to identify the economic quantity of production and purchase for the Pepsi can 330ml and essential components in Baghdad soft drinks Company in an environment dominated by cases of non ensure and High fluctuating as a result of fluctuating demand volumes and costs ass

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Journal Of Engineering
Compensation of the Nonlinear Power Amplifier by Using SCPWL Predistorter with Genetic Algorithm in OFDM technique
...Show More Authors

The High Power Amplifiers (HPAs), which are used in wireless communication, are distinctly characterized by nonlinear properties. The linearity of the HPA can be accomplished by retreating an HPA to put it in a linear region on account of power performance loss. Meanwhile the Orthogonal Frequency Division Multiplex signal is very rough. Therefore, it will be required a large undo to the linear action area that leads to a vital loss in power efficiency. Thereby, back-off is not a positive solution. A Simplicial Canonical Piecewise-Linear (SCPWL) model based digital predistorters are widely employed to compensating the nonlinear distortion that introduced by a HPA component in OFDM technology. In this paper, the genetic al

... Show More
View Publication Preview PDF
Crossref (3)
Crossref