Preferred Language
Articles
/
bsj-2627
The construction of Complete (kn,n)-arcs in The Projective Plane PG(2,5) by Geometric Method, with the Related Blocking Sets and Projective Codes
...Show More Authors

A (k,n)-arc is a set of k points of PG(2,q) for some n, but not n + 1 of them, are collinear. A (k,n)-arc is complete if it is not contained in a (k + 1,n)-arc. In this paper we construct complete (kn,n)-arcs in PG(2,5), n = 2,3,4,5, by geometric method, with the related blocking sets and projective codes.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 11 2002
Journal Name
Iraqi Journal Of Laser
The Use of a Pulsed Nd: YAG Laser Radiation for the Removal of Intracanal Debris and Smear Layer in Extracted Human Teeth
...Show More Authors

The efficiency of Nd:YAG laser radiation in removing debris and smear layer from prepared root
canal walls was studied. Fifty-seven human extracted single rooted anterior teeth were divided into three
groups. A group that was not lased is considered as a control group. The remaining teeth were exposed to
different laser parameters regarding laser energy, repetition rate and exposure time. For the case of the set of
parameters of 7 mJ laser energy, the cleaning was maximum at 3 p.p.s. repetition rate for 3 seconds exposure
time for, the coronal, middle and apical thirds. Above and below this energy level, there was an overdose
(melting) or under dose (no effect). Nevertheless for 10mJ laser energy case, the cleaning effi

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Electronic trading system and its refletion in the trading of stock market indices –an analytical study of the Iraqi market for securities–
...Show More Authors

The research aims at identify the role of the electronic trading system used in the Iraq stock exchange to promote trading activity for the stocks of listed companies in this market.

To prove the hypothesis of research, it was selected the main trading indicators for the market to be a main field in test the research hypothesis.it was selected as the period of time for (9)years span between the years (2005-2013) because they represent the first two articles of equal time periods represent aperiod that preceded the introduction of electronic trading system  while the second represents the period of time that followed 

The research found a number of conclusions but the mo

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 17 2019
Journal Name
Journal Of The College Of Education For Women
The Architectural Heritage of Baghdad in Ibn Al-Faqih Hamadani's Book Baghdad the City of Peace And its impact on Sustainable Development
...Show More Authors

This research shows the importance of Baghdad in the field of urban heritage and was demonstrated in the Ibn al-Fiqh al-Hamdani's book Baghdad the City of Peace in which he focused on many urban aspects and reviewing its historical importance by connecting them with modern events and the role they play in cultural and civilized construction which included: mosques, schools and markets etc. and the service providing institutions and other pillars of the Islamic cities through showing the development back then and its importance as an integral part of the urban and cultural heritage of the Islamic cities in general and Baghdad city in particular. 

In his book Baghdad the City of Peace, Ibn al-Faqih Hamadhaani

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Clinical And Experimental Dentistry
Comparison of the accuracy of intraoral digital impression system and conventional impression techniques for multiple implants in the full-arch edentulous mandible
...Show More Authors

View Publication
Scopus (9)
Crossref (12)
Scopus Crossref
Publication Date
Wed May 18 2016
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE APPLICITIONS OF JUST IN TIME PRODUCTION AND ITS ROLE ON THE COMPONENTS OF MARKETING INFORMATION SYSTEM: AN APPLIED STUDY IN ALMANSOUR OUR STATE COMPANY FOR CONSTRUCTIONAL CONTRACTS.: THE APPLICITIONS OF JUST IN TIME PRODUCTION AND ITS ROLE ON THE COMPONENTS OF MARKETING INFORMATION SYSTEM: AN APPLIED STUDY IN ALMANSOUR OUR STATE COMPANY FOR CONSTRUCTIONAL CONTRACTS.
...Show More Authors

Live the present companies in a competitive business environment going on and try to achieve excellence in their industry through the marketing of their products and achieve greater market share as possible to ensure its continued existence, and perhaps the concept of time production, which confirms, in essence, on the need to reduce inventory to a minimum in the production process as well as the concept of the marketing information system which asserts, in essence, to document all the events that are related to the marketing of the product provided by the production process, together constitute the subject deserves research and investigation as they have raised well-known in the fields of production management and marketing management.

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Bilinear System Identification Using Subspace Method
...Show More Authors

In this paper, a subspace identification method for bilinear systems is used . Wherein a " three-block " and " four-block " subspace algorithms are used. In this algorithms the input signal to the system does not have to be white . Simulation of these algorithms shows that the " four-block " gives fast convergence and the dimensions of the matrices involved are significantly smaller so that the computational complexity is lower as a comparison with " three-block " algorithm .

View Publication Preview PDF
Crossref
Publication Date
Sat Nov 01 2014
Journal Name
I-manager's Journal On Information Technology
AN ENHANCED METHOD FOR SPRITE EXTRACTING
...Show More Authors

The extracting of personal sprite from the whole image faced many problems in separating the sprite edge from the unneeded parts, some image software try to automate this process, but usually they couldn't find the edge or have false result. In this paper, the authors have made an enhancement on the use of Canny edge detection to locate the sprite from the whole image by adding some enhancement steps by using MATLAB. Moreover, remove all the non-relevant information from the image by selecting only the sprite and place it in a transparent background. The results of comparing the Canny edge detection with the proposed method shows improvement in the edge detection.

Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
ON NAIVE TAYLOR MODEL INTEGRATION METHOD
...Show More Authors

Interval methods for verified integration of initial value problems (IVPs) for ODEs have been used for more than 40 years. For many classes of IVPs, these methods have the ability to compute guaranteed error bounds for the flow of an ODE, where traditional methods provide only approximations to a solution. Overestimation, however, is a potential drawback of verified methods. For some problems, the computed error bounds become overly pessimistic, or integration even breaks down. The dependency problem and the wrapping effect are particular sources of overestimations in interval computations. Berz (see [1]) and his co-workers have developed Taylor model methods, which extend interval arithmetic with symbolic computations. The latter is an ef

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 04 2016
Journal Name
Journal Of The College Of Basic Education
Punch Holes, Invented Steganography Method Researchers
...Show More Authors

A coin has two sides. Steganography although conceals the existence of a message but is not completely secure. It is not meant to supersede cryptography but to supplement it. The main goal of this method is to minimize the number of LSBs that are changed when substituting them with the bits of characters in the secret message. This will lead to decrease the distortion (noise) that is occurred in the pixels of the stego-image and as a result increase the immunity of the stego-image against the visual attack. The experiment shows that the proposed method gives good enhancement to the steganoraphy technique and there is no difference between the cover-image and the stego-image that can be seen by the human vision system (HVS), so this method c

... Show More