Many of accurate inertial guided missilc systems need to use more complex mathematical calculations and require a high speed processing to ensure the real-time opreation. This will give rise to the need of developing an effcint
In practical engineering problems, uncertainty exists not only in external excitations but also in structural parameters. This study investigates the influence of structural geometry, elastic modulus, mass density, and section dimension uncertainty on the stochastic earthquake response of portal frames subjected to random ground motions. The North-South component of the El Centro earthquake in 1940 in California is selected as the ground excitation. Using the power spectral density function, the two-dimensional finite element model of the portal frame’s base motion is modified to account for random ground motions. A probabilistic study of the portal frame structure using stochastic finite elements utilizing Monte Carlo simulation
... Show MoreThe present investigation revealed cytological variations for six species (Eruca sativa, Sisymbirium irio, Diplotaxis harra, Erucaria hispanica, Schimpera Arabica and Brassica tournefortii ) belong to the Brassicaceaefamily.The flower buds were collected from Al-Habania lake that located in Al-Anbar-Iraq. Using iron-acetocarmine squash technique in anther-smear studies which revealed a chromosomal anomalies such as Lagging/brddge chromosomes, Micronuclei & initiated delay of four daughter cells.The frequency of abnormalities ranged (0.04 - 0.77%) which indicated the unstable heredity source of most wildplants. The pollen grains viability was estimated using acetocarmine stain, viable grains had stained, while sterile grains had not.T
... Show MoreThe present investigation revealed cytological variations for six species (Eruca
sativa, Sisymbirium irio, Diplotaxis harra, Erucaria hispanica, Schimpera Arabica
and Brassica tournefortii ) belong to the Brassicaceaefamily.The flower buds were
collected from Al-Habania lake that located in Al-Anbar-Iraq. Using ironacetocarmine
squash technique in anther-smear studies which revealed a
chromosomal anomalies such as Lagging/brddge chromosomes, Micronuclei &
initiated delay of four daughter cells.The frequency of abnormalities ranged (0.04 -
0.77%) which indicated the unstable heredity source of most wildplants. The pollen
grains viability was estimated using acetocarmine stain, viable grains had stained,while st
There are many methods of searching large amount of data to find one particular piece of information. Such as find name of person in record of mobile. Certain methods of organizing data make the search process more efficient the objective of these methods is to find the element with least cost (least time). Binary search algorithm is faster than sequential and other commonly used search algorithms. This research develops binary search algorithm by using new structure called Triple, structure in this structure data are represented as triple. It consists of three locations (1-Top, 2-Left, and 3-Right) Binary search algorithm divide the search interval in half, this process makes the maximum number of comparisons (Average case com
... Show MoreIncreasing need for day after day to find ways and innovative means of
helping to educate and give children the skills of different kind, has found a
researcher on the subject of hats, six room to give children language skills
through the experience of field reconnaissance conducted on the three
children found that language skills improved, he decided to make these study.
Objectives of the study:
Understand the differences between the experimental group first (the way the
debate) and second (six caps) depending on the test post administration.
to identify the language skills of the second group according to the pre and
post test
Differences between males and females in the second group (Six Hats)
Search T
Is a high degree of economic freedom an important part in the development of the economies of developing countries in the last decade of the twentieth century and the beginning of the twentieth century and the atheist. This is because a test subject (deltoid analysis of the relationship between the degree of economic freedom and foreign trade of selected developing countries for the period
( 1990 -2005) to determine the degree of economic freedom in foreign trade promotion in Singapore and Turkey. The research recommends a number of recommendations, the most important is the responsibility of the Ministry of Planning in Iraq that is providing the necessary data for the Fraser Institute, the aim of increasing cooperation
Landsat7 of Enhanced thematic mapper plus (ETM+) was launched on April 15, 1999. Four years later, images start degrading due to the scan line corrector (SLC). SLC is a malfunction that results in pixel gaps in images captured by the sensor of Landsat7. The pixel gap regions extend from about one pixel near the image center and reach up to about 14 pixels in width near the image edge. The shape of this loss is like a zigzag line; however, there are different studies about repairing these gaps. The challenge of all studies depends on retrieving inhomogeneous areas because the homogenous area can be retrieved quickly depending on the surrounding area. This research focuses on filling these gaps by utilizing pixels around them
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreCryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms
... Show More