Preferred Language
Articles
/
bsj-5772
Projective MDS Codes Over GF(27)‎
...Show More Authors

MDS code is a linear code that achieves equality in the Singleton bound, and projective MDS (PG-MDS) is MDS code with independents property of any two columns of its generator matrix.   In this paper, elementary methods for modifying a PG-MDS code of dimensions 2, 3, as extending and lengthening, in order to find new incomplete PG-MDS codes have been used over . Also, two complete PG-MDS codes over  of length  and 28 have been found.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 25 2009
Journal Name
Wireless Personal Communications
A N-Radon Based OFDM Trasceivers Design and Performance Simulation Over Different Channel Models
...Show More Authors

In this paper a new method is proposed to perform the N-Radon orthogonal frequency division multiplexing (OFDM), which are equivalent to 4-quadrature amplitude modulation (QAM), 16-QAM, 64-QAM, 256-QAM, ... etc. in spectral efficiency. This non conventional method is proposed in order to reduce the constellation energy and increase spectral efficiency. The proposed method gives a significant improvement in Bit Error Rate performance, and keeps bandwidth efficiency and spectrum shape as good as conventional Fast Fourier Transform based OFDM. The new structure was tested and compared with conventional OFDM for Additive White Gaussian Noise, flat, and multi-path selective fading channels. Simulation tests were generated for different channels

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
Some Results about Acts over Monoid and Bounded Linear Operators
...Show More Authors

This study delves into the properties of the associated act V over the monoid S of sinshT. It examines the relationship between faithful, finitely generated, and separated acts, as well as their connections to one-to-one and onto operators. Additionally, the correlation between acts over a monoid and modules over a ring is explored. Specifically, it is established that  functions as an act over S if and only if  functions as module, where T represents a nilpotent operator. Furthermore, it is proved that when T is onto operator and  is finitely generated, is guaranteed to be finite-dimensional. Prove that for any bounded operator the following,  is acting over S if and only if  is a module where T is a nilpotent operator, is a

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Baghdad Science Journal
Some Results about Acts over Monoid and Bounded Linear Operators
...Show More Authors

 الأثر V بالنسبة إلى   sinshT و خواصه قد تم دراسته في هذا البحث حيث تم دراسة علاقة الأثر المخلص والاثر المنتهى التولد والاثر المنفصل وربطها بالمؤثرات المتباينة حيث تم بهنة العلاقات التالية ان الاثر اذا وفقط اذا مقاس في حالة كون المؤثر هو عديم القوة وكذلك في حالة كون المؤثر شامل فان الاثر هو منتهي التولد اي ان الغضاء هو منتهي التولد وايضا تم برهن ان الاثر مخلص لكل مؤثر مقيد وك\لك قد تم التحقق من انه لاي مؤثر مقي

... Show More
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
Flow Over the Spillway of AlAdhiam Dam Under Gated Condition
...Show More Authors

The AlAdhaim Dam is located 133 kilometers northeast of Baghdad. It is a multipurpose dam and joints the Iraqi dam system in 2000. It has a storage capacity of 1.5 billion m3. The dam has an ogee spillway with a length of 562 m, a crest level of 131.5 m.a.m.s.l. and a maximum discharge capacity of 1150 m3/s at its maximum storage height of 143 m.a.m.s.l. This research aimed to investigate the hydrodynamics performance of the spillway and the stilling basin of AlAdhiam Dam by using numerical simulation models under gated situations. It was suggested to modify the dam capacity by increasing the dam's storage capacity by installing gates on the crest of the dam spillway. The FLUENT program was used to

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Apr 07 2023
Journal Name
Multidisciplinary International Journal
INTEGRATION BETWEEN LANGUAGE AND LITERATURE OVER TEACHING OF FOREIGN LANGUAGES
...Show More Authors

PDBN Rashid, Multidisciplinary International Journal, 2023

View Publication
Publication Date
Thu Nov 01 2012
Journal Name
Journal Of Cosmetics, Dermatological Sciences And Applications
Lifa disease: frictional dermal melanosis over bony prominences (clinicopathological study)
...Show More Authors

KE Sharquie, MA Al-Dhalimi, AA Noaimi, HA Al-Sultany, Journal of Cosmetics, Dermatological Sciences and Applications, 2012 - Cited by 2

View Publication
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Engineering
Double-Staged Syndrome Coding Scheme for Improving Information Transmission Security over the Wiretap Channel
...Show More Authors

This paper presents a study of a syndrome coding scheme for different binary linear error correcting codes that refer to the code families such as BCH, BKLC, Golay, and Hamming. The study is implemented on Wyner’s wiretap channel model when the main channel is error-free and the eavesdropper channel is a binary symmetric channel with crossover error probability (0 < Pe ≤ 0.5) to show the security performance of error correcting codes while used in the single-staged syndrome coding scheme in terms of equivocation rate. Generally, these codes are not designed for secure information transmission, and they have low equivocation rates when they are used in the syndrome coding scheme. Therefore, to improve the transmiss

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Al–bahith Al–a'alami
Political Use of the Photograph: A Semiotic Study of the Photograph of Al-Kadhimi's Visit to Fallujah on the Anniversary of the Victory Over ISIS
...Show More Authors

The research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise messag

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 28 2020
Journal Name
Journal Of The College Of Education For Women
The Conflict of Active Regional and International Powers over Nagorny Karabakh Region: وداد حسين خضير علي , و مهيمن عبد الحليم طه الوادي
...Show More Authors

      The current study is descriptive; it focuses on studying the contemporary geopolitical problem, and sectarian differences in Caucasus. Nagorno-Karabakh is considered an important disputed region nowadays. Many parties and states participated in this dispute, especially after the conflict had developed into an open war between Armenia and Azerbaijan. Thus, the study aims to examine the causes of the conflict in this region, analyze the international positions on this conflict, and find if Armenia was able to occupy this region. The methodology adopted by the researchers is the functional approach, and the theory of power analysis that Cohen created for analyzing all strengths that drove each of the parties t

... Show More
View Publication Preview PDF
Crossref