Preferred Language
Articles
/
ijp-4
A simple voice communication using the modulation of the reflected light
...Show More Authors

There is no adopt in the importance of the optical communications in scientific civil and military applications because of it’s simplicity in manufacturing and it's low cost. The method of optical communication depends upon bearing the light beam the translated informations by a method called the light modulation. This method depends upon changing some light properties as frequency, amplitude and pulse duration according to the translating informations. The changes in the first two properties are concerned optically with the analog modulation while the third one concern at most with digital modulation. All past methods are expensive with low efficiency and needs electrical or magnetic fields. In this technique the source of voice used a source of emitting light at the same time. This was done by using a reflecting microphone to reflect the incident laser beam to the receiver which was an photocell which connected to an audio amplifier. The emitting voice was clear without any type of noise with very high efficiency.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Studying the ability of transformation of lymphocytes by using PHA in patient with Cytomegalovirus
...Show More Authors

Blood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 20 2020
Journal Name
Geosciences
Thematic Maps for the Variation of Bearing Capacity of Soil Using SPTs and MATLAB
...Show More Authors

The current study involves placing 135 boreholes drilled to a depth of 10 m below the existing ground level. Three standard penetration tests (SPT) are performed at depths of 1.5, 6, and 9.5 m for each borehole. To produce thematic maps with coordinates and depths for the bearing capacity variation of the soil, a numerical analysis was conducted using MATLAB software. Despite several-order interpolation polynomials being used to estimate the bearing capacity of soil, the first-order polynomial was the best among the other trials due to its simplicity and fast calculations. Additionally, the root mean squared error (RMSE) was almost the same for the all of the tried models. The results of the study can be summarized by the production

... Show More
View Publication
Crossref (23)
Crossref
Publication Date
Sat Jul 23 2022
Journal Name
Environmental Monitoring And Assessment
Impact of using magnetic water on the micro structure of leached saline-sodic soil
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
Investigating The Ideology of Bullying in Hunt’s Fish in a Tree: A Critical Stylistic Approach
...Show More Authors

         Language always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Account the expected values ??for a single particle to a group of atoms and ions
...Show More Authors

Technique was used to retail for analyzing atom beryllium ion cathode of an atom lithium to six pairs of functions wave which two ?????? and the rest of the casing moderation and to analyze atom lithium ion Mob atom beryllium to three pairs of functions wave pair of casing and the rest of the casing moderation using function wave Hartree Fock and each casing email wascalculate expected values ??....

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of The College Of Languages (jcl)
A Study in Tess of the D’Urbervilles as A Call for Liberal Education for Women
...Show More Authors

Amongst the literary writers who used their art to direct the attention towards the issue of woman and her rights in a proper life is the English poet and novelist Thomas Hardy (1840-1928), who has been praised for his “openness to the feminine principle” 1 as Irving Howe put it. Hardy’s wide readings have changed his way of dealing with and thinking about so many critical issues which started to float on the surface of the English society during the mid and late of the 19th century. His readings for a number of writers, who seem of huge impact on his writings as he later admits that – “[his] pages show harmony of view with

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 28 2023
Journal Name
Mathematics
The Impact of Fear on a Harvested Prey–Predator System with Disease in a Prey
...Show More Authors

A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Feb 28 2023
Journal Name
International Journal Of Safety And Security Engineering
The Safer City: A New Planning Perspective for the Traditional City Development
...Show More Authors

View Publication
Scopus (10)
Scopus Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Attitude The King Ghazi a Problem the Border with Kuwait 1933-1939
...Show More Authors

King Ghazi (1933-1939) was of the Arabic characters that characterized national and
patriotic spirit and that faced the British policy in all its aspects.
King Ghazi distinguished as of Arab nationalist tendencies and called for the
liberalization of Arab lands which were under the rule of the Ottoman Empire. He called for
reunification under the one Arab country, Hence came the King invitations to liberate Kuwait
from the British protectorate and consolidated with Iraq.
King Ghazi established a private radio station in the royal palace (AL zzaahoor) palace
and provided special programs to return of Kuwait to Iraq, this radio station was The
prominent role in the revitalization of the Kuwaiti National Movement, an

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
A comparative Study to calculate the Runs Property in the encryption systems
...Show More Authors

Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured determinis

... Show More
View Publication Preview PDF