Preferred Language
Articles
/
ijs-12166
On Almost Maximum Distance Separable Codes
...Show More Authors

The main goal of this paper is to make link between the subjects of projective
geometry, vector space and linear codes. The properties of codes and some examples
are shown. Furthermore, we will give some information about the geometrical
structure of the arcs. All these arcs are give rise to an error-correcting code that
corrects the maximum possible number of errors for its length.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 13 2024
Journal Name
Iraqi Journal Of Science
A Study on the Bases of Space of Vector Valued Entire Multiple Dirichlet Series
...Show More Authors

Let 


 
, 1
( )
1 2 ,
( , ) 1 2
m n
s s
m n
f s s a e m n   , (s   it , j 1,2) j j j  ,  
m 1  and
 
n 1  being an increasing sequences of positive numbers and a E m n  , where E
is Banach algebra, represent a vector valued entire Dirichlet functions in two
variables. The space  of all such entire functions having order at most equal to 
is considered in this paper. A metric topology using the growth parameters of f is
defined on  and its various properties are obtained. The form of linear operator on
the space  is characterized and proper bases are also characterized in terms of
growth parameters  .

View Publication Preview PDF
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Some Geometric Properties of Multivalent Functions Defined on Hilbert Space
...Show More Authors

The main goal of this paper is to study applications of the fractional calculus techniques for a certain subclass of multivalent analytic functions on Hilbert Space. Also, we obtain the coefficient estimates, extreme points, convex combination and hadamard product.

View Publication Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
THE INFLUENCE OF TOOL GEOMETRY OF FRICTION STIR WELDS ON MECHANICAL PROPERTIES AND MICROSTRUCTURE OF 2218-T72 ALUMINUM ALLOY
...Show More Authors

Friction stir welding (FSW) process is an emerging solid state joining process in which the material that is being welded does not melt. This process uses a nonconsumable tool to generate frictional heat in the abutting surfaces. The welding parameters such as tool rotational speed, welding speed, axial force, etc., and tool pin profile play a major role in deciding the weld quality. In this investigation an attempt
has been made to understand the effect of tool pin profile and rotation diameter on microstructure and mechanical properties in aluminum alloy (2218-T72). Five different tool pin profiles (straight cylindrical, threaded cylindrical, triangular, square, and threaded cylindrical with flat), with three different rotation
d

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Low computations in compression image schemes using Cache codebook based on Weber's law
...Show More Authors

In this paper, we have employed a computation of three technique to reduce the computational complexity and bit rate for compressed image. These techniques are bit plane coding based on two absolute values, vector quantization VQ technique using Cache codebook and Weber's low condition. The experimental results show that the proposed techniques achieve reduce the storage size of bit plane and low computational complexity.

View Publication Preview PDF
Publication Date
Sat Jul 21 2018
Journal Name
The American Society For Virology's 38th Annual Meeting Will Be Held At The University Of Minnesota In Minneapolis, Mn
Comparative Study of different Predators’ effect on Chlorovirus Amplification Foraging on Zoochlorellae-Containing Paramecia?
...Show More Authors

Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering
Investigations on the Impact of Using Elliptic Groynes on the Flow in Open Channels
...Show More Authors

This paper presents a numerical simulation of the flow around elliptic groynes by using CFD ‎software. The flow was simulated in a flume with 4m long, 0.4m wide, ‎and 0.175m ‎high ‎‎with a constant bed slope. Moreover, the first Groyne placed at 1m from the flow ‎‎inlet with a ‎constant the Groyne height of 10cm and a 1cm thickness, and the ‎width of Groynes equals ‎7cm‎. A submergence ratio of the elliptic Groynes of 75% was assumed, corresponding to a discharge of ‎0.0057‎m3/sec. The CFD ‎model showed a good ability to simulate the flow ‎around ‎Groynes with ‎ good accuracy. The results of ‎CFD software showed that when using double elliptic Groy

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
The Effect of Thymosin Beta 4 on Developing Dental Tissue (Experimental Study on Rats)
...Show More Authors

Background: Odontogenisis is a complex process controlled by dynamic and reciprocal interactions that regulated by various molecules. Thymosin β4 is a small bioactive peptide with wide spectrum biological effects on much cell types. The present study was designed to highlight the effect of synthetic exogenous Tβ4 on developing dental tissue of the upper central teeth of rats, by histological examination and immunohistochemical evaluation of TGFβ1. Materials and method: Thirty six Albino Wister pregnant rat 18control group received intraperitoneal injection of normal saline and the others are experimental group received 50µg/300µl of Tβ4 injection. The animals were sacrificed at periods 16th and 18th day I.U.L and one day p

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 06 2022
Journal Name
Al–bahith Al–a'alami
News framing of the Israeli aggression on Gaza in 2021 on i24 Israeli channel.
...Show More Authors

The study aimed to identify the news framing on the Israeli Arabic-speaking i24 channel of the Israeli aggression on Gaza -2021 by analyzing the channel’s Program “this evening”. The study used the media survey method, and in its framework, it relied on the content analysis method for the program’s episodes from May 5, 2021 AD until June 4, 2021 AD, with 22 episodes. The study showed the program’s interest in launching the Palestinian resistance’s rockets significantly, followed by the Israeli military operations, and the program’s reliance on correspondents largely as a source of news material related to the aggression. It also proved that a news report and a reporter's report was the most important form of presenting news

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 10 2021
Journal Name
Journal Of Mechanical Engineering Research And Developments
Study on the effect of diesel engine oil contaminated with fuel on engine performance
...Show More Authors

An experiment was conducted to study how SAE 50 engine oil contaminated with diesel fuel affects engine performance. The engine oil was contaminated with diesel fuel at concentrations of 0%, 1%, and 3%. The following performance characteristics were studied: brake-specific fuel consumption, brake thermal efficiency, friction power, and exhaust gas temperature. Each treatment was tested three times. The three treatments (0%, 1%, and 3%) were analyzed statistically with a one-way ANOVA model at the 5% probability level to determine if the three treatments produced significant differences in engine performance. The statistical results showed that there were significant differences in engine performance metrics among the three treatments. The 3

... Show More
Preview PDF
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication