Preferred Language
Articles
/
bsj-5174
Numerical Solution for Linear State Space Systems using Haar Wavelets Method
...Show More Authors

In this research, Haar wavelets method has been utilized to approximate a numerical solution for Linear state space systems. The solution technique is used Haar wavelet functions and Haar wavelet operational matrix with the operation to transform the state space system into a system of linear algebraic equations which can be resolved by MATLAB over an interval from 0 to . The exactness of the state variables can be enhanced by increasing the Haar wavelet resolution. The method has been applied for different examples and the simulation results have been illustrated in graphics and compared with the exact solution.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Approximate Solution for Two Machine Flow Shop Scheduling Problem to Minimize the Total Earliness
...Show More Authors

This paper proposes a new algorithm (F2SE) and algorithm (Alg(n – 1)) for solving the
two-machine flow shop problem with the objective of minimizing total earliness. This
complexity result leads us to use an enumeration solution approach for the algorithm (F2SE)
and (DM) is more effective than algorithm Alg( n – 1) to obtain approximate solution.

View Publication Preview PDF
Publication Date
Thu Mar 16 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Adenine as Environmentally- Friendly Corrosion Inhibitor for Stainless Steel in Sodium Chloride Acid Solution
...Show More Authors

The corrosion behavior and the influence of the concentration of adenine (AD) on the corrosion of 316L stainless steel in 0.6 mol.dm-3 sodium chloride acid solutions were studied. The research was performed in two pH values (pH=2 and pH=4) over the temperature range (293- 308)K. The investigation involved electrochemical polarization method using potentiostatic technique. Tafel polarization study revealed that (AD) acted as a mixed inhibitor. The inhibition efficiency increased with an increase in the concentration of adenine, but decreased with increase in temperature. (efficiency= 87% at 0.01 M AD & at T= 293K). The adsorption of (AD) has been found to occur on the surface of 316L stainless steel according to the Langmuir isotherm.

... Show More
View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Civil Engineering Journal
The Suitability of Bailey Method for Design of Local Asphalt Concrete Mixture
...Show More Authors

The study investigated the behaviour of asphalt concrete mixes for aggregate gradations, according to the Iraqi specification using the Bailey method designed by an Excel spreadsheet. In mixing aggregates with varying gradations (coarse and fine aggregate), The Bailey method is a systematic methodology that offers aggregate interlocking as the backbone of the framework and a controlled gradation to complete the blends. Six types of gradation are used according to the bailey method considered in this study. Two-course prepared Asphalt Concrete Wearing and Asphalt Concrete binder, the Nominal Maximum Aggregate Sizes (NMAS) of the mixtures are 19 and 12.5 mm, respectively. The total number of specimens was 240 for both layers (15 samp

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving the Performance of Construction Project Information and Communication Management Using Web-Based Project Management Systems (WPMSs)
...Show More Authors

This paper presents a brief study undertaken for improving the performance of information and communication management of construction projects through investing in information and communication technologies (ICT). The work aims at first to investigate and diagnose the problems, challenges, weaknesses, and inefficiencies related to information and communication management in projects in the construction industry of Iraq. Studying the diagnosed matters and the different solutions of ICT to improve project management performance is following the investigation process. The research presents a technological system suggested to process a lot of the diagnosed problems, challenges, weakness, and inefficiencies of the construction projects and t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Al-rafidain Dental Journal
The Effect of Two Bonding Agents Generations On Microleakage Of Composite Resin Using Two Light Curing Systems.
...Show More Authors

Aim: To evaluate the effect of two bonding systems and two curing systems on sealing ability of class V composite restorative materials. Materials and methods: This study was performed in vitro on 40 caries free upper first premolar teeth. The Standardized class V cavity preparation on buccal and lin- gual surfaces of each tooth was done. Then the teeth were randomly divided into two major groups each of twenty. 40 cavities were performed on these teeth and the first group7th generation bonding agent (i Bond) were applied according to the manufacturer instructions and single increment of univer- sal composite (XRV Herculite) from kerr were applied and twenty of the cavities were cured with con- ventional light cure device (astralis-5) and t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Transport Assessment Using Bayesian Method to Determine Ride-Hailing in Kula Lumpur: A Case Study
...Show More Authors

This research was designed to investigate the factors affecting the frequency of use of ride-hailing in a fast-growing metropolitan region in Southeast Asia, Kuala Lumpur. An intercept survey was used to conduct this study in three potential locations that were acknowledged by one of the most famous ride-hailing companies in Kuala Lumpur. This study used non-parametric and machine learning techniques to analyze the data, including the Pearson chi-square test and Bayesian Network. From 38 statements (input variables), the Pearson chi-square test identified 14 variables as the most important. These variables were used as predictors in developing a BN model that predicts the probability of weekly usage frequency of ride-hai

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Iraqi Journal Of Agricultural Sciences
Effect of cultural media and nutrient solution on quality and production of cucumber by using hydroponic system.
...Show More Authors