Preferred Language
Articles
/
ijs-3563
Fixed Point Theory for Study the Controllability of Boundary Control Problems in Reflexive Banach Spaces

      In this paper, we extend the work of our proplem in uniformly convex Banach spaces using Kirk fixed point theorem. Thus the existence and sufficient conditions for the controllability to general formulation of nonlinear boundary control problems in reflexive Banach spaces are introduced. The results are obtained by using fixed point theorem that deals with nonexpanisive mapping defined on a set has normal structure and strongly continuous semigroup theory. An application is given to illustrate the  importance of the results.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 01 2014
Journal Name
Al-khwarizmi Engineering Journal
Heterogeneous Photocatalytic Degradation for Treatment of Oil from Wastewater

In the present study, advanced oxidation process / heterogeneous photocatalytic process (UV/TiO2/Fenton) system was investigated to the treatment of oily wastewater. The present study was conducted to evaluate the effect of hydrogen peroxide concentration H2O2, initial amount of the iron catalyst Fe+2, pH, temperature, amount of TiO2 and the concentration of oil in the wastewater.  The removal efficiency for the system UV/TiO2/Fenton at optimal conditions and dosage (H2O2 = 400mg/L, Fe+2 = 40mg/L, pH=5, temperature =30oC, TiO2=75mg/L) for 1000mg/L load was found to be 77%.

Aluminum foil cover around the re

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 12 2022
Journal Name
Iraqi Journal Of Science
Constructing of Analysis Mathematical Model for Stream Cipher Cryptosystems

The aim of this paper is to construct the analysis mathematical model for stream cipher cryptosystems in order to be cryptanalysis using the cryptanalysis tools based on plaintext attack (or part from it) or ciphertext only attack, choosing Brüer generator as study case of nonlinear stream cipher system.
The constructing process includes constructing the linear (or non-linear) equations system of the attacked nonlinear generator. The attacking of stream cipher cryptosystem means solving the equations system and that means finding the initial key values for each combined LFSR. 

View Publication Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Engineering
Laboratory Preparation of Simulated Sludge for Anaerobic Digestion Experimentation

Health and environmental factors as well as operational difficulties are major challenges facing the development of an anaerobic digestion process. Some of these problems relate to the use of sludge collected from primary and secondary clarifier units in wastewater treatment plants for laboratory purposes.

The present study addresses the preparation of sludge for laboratory purposes by using a mixture that consists of the digested sludge, which is less pathogenic, compared to the collected sludge from the primary or secondary clarifier, and food wastes. The sludge has been tested experimentally for 19 and 32 days under mesophilic conditions. The results show a steady methane production rate from the anaerobic dig

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 10 2010
Journal Name
Iraqi Journal Of Laser
Generation of Weak Coherent Pulses for Quantum Cryptography Systems

This work is a trial to ensure the absolute security in any quantum cryptography (QC) protocol via building an effective hardware for satisfying the single-photon must requirement by controlling the value of mean photon number. This was approximately achieved by building a driving circuit that provide very short pulses (≈ 10 ns) for laser diode -LD- with output power of (0.7-0.99mW) using the available electronic components in local markets. These short pulses enable getting faint laser pulses that were further attenuated to reach mean photon number equal to 0.08 or less.

View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Toward a stereotype specification for measurement of university women

A- The research problem: the research problem which is the garments industry, as a
whole it does not rely on a single system in the sizes of the clothing and the working
companies, see that it is not plausible that the sizes be unificd and consistent in all companies.
The current sizes in the domestic Iraqi markets are not suitable for some females ,on the other
hand the Iraqi industry suffers the lack of a modern standard for some Iraqis female bodies.
B- The Signifiance of the research: lies in the study of the diversity of the human body
sizes and naming them to reflect the desires and requirements of the consumer and try to find
a method to meet their expectations as well as to raise the level of garments industr

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2016
Journal Name
Journal Of Engineering
Estimation of Mass Transfer Coefficient for Copper Electrowinning Process

Mass transfer was examined at a stationary rectangular copper electrode (cathode) by using the reduction of cupric ions as the electrochemical reaction. The influence of electrolyte temperature (25, 45, and 65 oC), and cupric ions concentration (4, 8, and 12 mM) on mass transfer coefficient were investigated by using limiting current technique. The mass transfer coefficient and hence the Sherwood number was correlated as Sh =

 

View Publication Preview PDF
Publication Date
Thu Mar 04 2021
Journal Name
Journal Of Craniofacial Surgery
Crossref (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Cloud Manufacturing framework for controlling and monitoring of machines

Due to the development that occurs in the technologies of information system many techniques was introduced and played important role in the connection between machines and peoples through internet, also it used to control and monitor of machines, these technologies called cloud computing and Internet of Things. With the replacement of computing resources with manufacturing resources cloud computing named converted into cloud manufacturing.

In this research cloud computing was used in the field of manufacturing to automate the process of selecting G-Code that Computer Numerical Control machine work it, this process was applied by the using of this machine with Radio Frequency Identification and a AWS Cloud services and some of py

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Cross Dipole Antennas Solution for Angle of Arrival Estimation

The Multiple Signal Classification (MUSIC) algorithm is the most popular algorithm to estimate the Angle of Arrival (AOA) of the received signals. The analysis of this algorithm (MUSIC) with typical array antenna element ( ) shows that there are two false direction indication in the plan
aligned with the axis of the array. In this paper a suggested modification on array system is proposed by using two perpendiculars crossed dipole array antenna in spite of one array antenna. The suggested modification does not affect the AOA estimation algorithm. The simulation and results shows that the proposed solution overcomes the MUSIC problem without any effect on the performance of the system.

Crossref
View Publication Preview PDF
Publication Date
Tue Apr 21 2020
Journal Name
University Of Thi-qar Journal Of Science (university Of Thi-qar Journal Of Science (utsci) The 4th Scientific Conference Of Science College/ University Of Thi_qari) The 4th Scientific Conference Of Science College/ University Of Thi_qar
Preview PDF