Preferred Language
Articles
/
ijs-12166
On Almost Maximum Distance Separable Codes
...Show More Authors

The main goal of this paper is to make link between the subjects of projective
geometry, vector space and linear codes. The properties of codes and some examples
are shown. Furthermore, we will give some information about the geometrical
structure of the arcs. All these arcs are give rise to an error-correcting code that
corrects the maximum possible number of errors for its length.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
Space suitability and its functional implications in interior design
...Show More Authors

The current research dealt with the study of space compatibility and its role in enhancing the functional aspect of the design of the interior spaces of isolation hospitals by finding a system or format that is compatible with the nature of the changes occurring in the structure and function of the space system, as well as contributing to enhancing compatibility between the functional aspect and the interior space. Therefore, the designer must The interior is the study of the functional and spatial aspects as they are the basic aspects for achieving suitability, and through the interaction between the person and the place, the utilitarian performance characteristics are generated that the interior designer is interested in and tries to d

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 15 2023
Journal Name
Journal Of Interdisciplinary Mathematics
Some games via semi-generalized regular spaces
...Show More Authors

In this research, a new application has been developed for games by using the generalization of the separation axioms in topology, in particular regular, Sg-regular and SSg- regular spaces. The games under study consist of two players and the victory of the second player depends on the strategy and choice of the first player. Many regularity, Sg, SSg regularity theorems have been proven using this type of game, and many results and illustrative examples have been presented

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Completion of Generalized 2-Inner Product Spaces
...Show More Authors

A complete metric space is a well-known concept. Kreyszig shows that every non-complete metric space  can be developed into a complete metric space , referred to as completion of .

We use the b-Cauchy sequence to form  which “is the set of all b-Cauchy sequences equivalence classes”. After that, we prove  to be a 2-normed space. Then, we construct an isometric by defining the function from  to ; thus  and  are isometric, where  is the subset of  composed of the equivalence classes that contains constant b-Cauchy sequences. Finally, we prove that  is dense in ,  is complete and the uniqueness of  is up to isometrics

 

View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Boundary Optimal Control for Triple Nonlinear Hyperbolic Boundary Value Problem with State Constraints
...Show More Authors

The paper is concerned with the state and proof of the solvability theorem of unique state vector solution (SVS) of triple nonlinear hyperbolic boundary value problem (TNLHBVP), via utilizing the Galerkin method (GAM) with the Aubin theorem (AUTH), when the boundary control vector (BCV) is known. Solvability theorem of a boundary optimal control vector (BOCV) with equality and inequality state vector constraints (EINESVC) is proved. We studied the solvability theorem of a unique solution for the adjoint triple boundary value problem (ATHBVP) associated with TNLHBVP. The directional derivation (DRD) of the "Hamiltonian"(DRDH) is deduced. Finally, the necessary theorem (necessary conditions "NCOs") and the sufficient theorem (sufficient co

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Strongly Pseudo Nearly Semei-2-Absorbing Submodules (II)
...Show More Authors

Let  be a module over a commutative ring  with identity. Before studying the concept of the Strongly Pseudo Nearly Semi-2-Absorbing submodule, we need to mention the ideal  and the basics that you need to study the  concept of the Strongly Pseudo Nearly Semi-2-Absorbing submodule. Also, we introduce several characteristics of the Strongly Pseudo Nearly Semi-2-Absorbing submodule in classes of multiplication modules and other types of modules. We also had no luck because the ideal  is not a Strongly Pseudo Nearly Semi-2-Absorbing ideal. Also, it is noted that  is the Strongly Pseudo Nearly Semi-2-Absorbing ideal under several conditions, which is this faithful module, projective module, Z-regular module and content module and non-si

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Direct sum of π-projective semimodules
...Show More Authors

      Let A, and N  are a semiring ,and  a left A- semimodule, respectively. In this work we will discuss two cases: 

  1. The direct summand of π-projective semi module is π-projective, while the direct sum of two π-projective semimodules in general is not π-projective . The details of the proof will be given.
  2. We will give a condition under which the direct sum of two π-projective semi modules is π-projective, as well as we also set conditions under which π-projective semi modules are projective.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Advances In Materials Physics And Chemistry
The Role of Cooling Condition on the Superconducting Properties of Tl<sub>2-x</sub>Hg<sub>x</sub>Sr<sub>2</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> System
...Show More Authors

View Publication
Crossref
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Applying Quran Security and Hamming CodesFor Preventing of Text Modification
...Show More Authors

The widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Hybrid Techniques with Support Vector Machine for Improving Artifact Ultrasound Images
...Show More Authors

     The most common artifacts in ultrasound (US) imaging are reverberation and comet-tail. These are multiple reflection echoing the interface that causing them, and result in ghost echoes in the ultrasound image. A method to reduce these unwanted artifacts using a Otsu thresholding to find region of interest (reflection echoes) and output applied to median filter to remove noise. The developed method significantly reduced the magnitude of the reverberation and comet-tail artifacts. Support Vector Machine (SVM) algorithm is most suitable for hyperplane differentiate. For that, we use image enhancement, extraction of feature, region of interest, Otsu thresholding, and finally classification image datasets to normal or abnormal image.

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
Word Embedding Methods for Word Representation in Deep Learning for Natural Language Processing
...Show More Authors

    Natural Language Processing (NLP) deals with analysing, understanding and generating languages likes human. One of the challenges of NLP is training computers to understand the way of learning and using a language as human.  Every training session consists of several types of sentences with different context and linguistic structures. Meaning of a sentence depends on actual meaning of main words with their correct positions. Same word can be used as a noun or adjective or others based on their position. In NLP, Word Embedding is a powerful method which is trained on large collection of texts and encoded general semantic and syntactic information of words. Choosing a right word embedding generates more efficient result than others

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (15)
Scopus Crossref