Preferred Language
Articles
/
bsj-6229
Subgroups and Orbits by Companion Matrix in Three Dimensional Projective Space
...Show More Authors

The aim of this paper is to construct cyclic subgroups of the projective general linear group over  from the companion matrix, and then form caps of various degrees in . Geometric properties of these caps as secant distributions and index distributions are given and determined if they are complete. Also, partitioned of  into disjoint lines is discussed.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Wear Behavior Performance of Polymeric Matrix Composites Using Taguchi Experiments
...Show More Authors

This research estimates the effect of independent factors like filler  (3%, 6%, 9%, 11% weight fraction), normal load (5N, 10N, 15N), and time sliding (5,7 , 9 minutes) on wear behavior of unsaturated polyester resin reinforced with jute fiber and waste eggshell and, rice husk powder composites by utilizing a statistical approach. The specimens polymeric composite prepared from resin unsaturated polyester filled with (4% weight fraction) jute fiber, and (3%, 6%, 9%, 11% weight fraction) eggshell, and rice husk by utilizing (hand lay-up) molding. Dry sliding wear experiments were carried utilizing a standard (pin on disc test setup) following a well designed empirical schedule that depends on Taguchi’s experimental design L9 (MINIT

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Elzaki transform decomposition approach to solve Riccati matrix differential equations
...Show More Authors

Elzaki Transform Adomian decomposition technique (ETADM), which an elegant combine, has been employed in this work to solve non-linear Riccati matrix differential equations. Solutions are presented to demonstrate the relevance of the current approach. With the use of figures, the results of the proposed strategy are displayed and evaluated. It is demonstrated that the suggested approach is effective, dependable, and simple to apply to a range of related scientific and technical problems.

Scopus (1)
Scopus
Publication Date
Wed Dec 12 2018
Journal Name
Materials Science And Engineering
Optimum matrix acidizing: How much does it impact the productivity
...Show More Authors

Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Sun Mar 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Security For Three-Tiered Web Application
...Show More Authors

          Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research).  This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensur

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 25 2019
Journal Name
Engineering And Technology Journal
Improvement of Harris Algorithm Based on Gaussian Scale Space
...Show More Authors

Features is the description of the image contents which could be corner, blob or edge. Corners are one of the most important feature to describe image, therefore there are many algorithms to detect corners such as Harris, FAST, SUSAN, etc. Harris is a method for corner detection and it is an efficient and accurate feature detection method. Harris corner detection is rotation invariant but it isn’t scale invariant. This paper presents an efficient harris corner detector invariant to scale, this improvement done by using gaussian function with different scales. The experimental results illustrate that it is very useful to use Gaussian linear equation to deal with harris weakness.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 15 2020
Journal Name
Al-academy
The political dimension in the speech of the director, author (Dawoud Abdel Sayed) Citizen film, informant and thief (amodel): احمد جبار عبد الكاظم
...Show More Authors

The research addresses the questioning of political loads in a cinematic model from the films of the author (David Abdel Sayed), who has been busy throughout his films in criticizing political power, where he presented protests visions her body the artistic composition of cinematic means of expression through artistic treatments that facilitate the representations of modernity in contemporary cinematic trends, and by this Several contemporary cinematic criticism is an example of a thinker cinematographer who presents his critical thesis on power politics through the composition of the film (material - form - expression). The research consisted of four chapters. The first was a methodological framework that included the research problem o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
2018 International Conference On Advanced Science And Engineering (icoase)
Real-Time Face Tracking and Recognition System Using Kanade-Lucas-Tomasi and Two-Dimensional Principal Component Analysis
...Show More Authors

View Publication
Scopus (16)
Crossref (8)
Scopus Crossref
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Best Proximity Point Theorem for φ ̃–ψ ̃-Proximal Contractive Mapping in Fuzzy Normed Space
...Show More Authors

The study of fixed points on the  maps fulfilling certain contraction requirements has several applications and has been the focus of numerous research endeavors. On the other hand, as an extension of the idea of the best approximation, the best proximity point (ƁƤƤ) emerges. The best approximation theorem ensures the existence of an approximate solution; the best proximity point theorem is considered for addressing the problem in order to arrive at an optimum approximate solution. This paper introduces a new kind of proximal contraction mapping and establishes the best proximity point theorem for such mapping in fuzzy normed space ( space). In the beginning, the concept of the best proximity point was introduced. The concept of prox

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri May 01 2015
Journal Name
Journal Of The Faculty Of Medicine
Gentamycin injection in disc space during lumbar discectomy (aiming to prevent post - operative discitis)
...Show More Authors

AW Ali T, Journal of the Faculty of Medicine, 2015 - Cited by 3

View Publication