Preferred Language
Articles
/
ijs-6449
Re-Distribution of the Regions of 100 Comets Using a Statistical Method
...Show More Authors

     In this study, the comets have distributions regarding their heliocentric distances where they appear in two regions, Kuiper belt (short period) and Oort cloud (long period). Details here give new information about the entire regions of these comets; the research shows that 54% of comets are nearby asteroid belt, but only 11% are in Kuiper belts and 35 % are from Oort cloud. The research focuses on comets with a nucleus's radius larger than 1 km.  The comets with a nuclear radius of 1-10 km have high percentage 51%.

         From the results, the maximum comets' radius is found in comet 29P/Schwassmann -Wachmann as roughly 87 km, and also in comet C/2018 N2 (ASASSN) which has radius 88 km. All comets, that have been distributed concerning heliocentric, depend on statistical results to divide new comets' regions versus their radiuses. The results reveal new details of comets' distances from the sun. The distances of 100 comets are shown in Figure (2).

The results show that there is a third comets' region: region (A) found between Mars and Saturn and between Oort cloud and Kuiper belt.

   There is one comet like(C/2019 L3 (ATLAS)) that is farther than Alpha Centauri star. Therefore, the comet is restricted by a couple of gravity systems.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Reliability Estimation Of Fuzzy Failure Times Of Free Distribution And It Use To Estimate The Fuzzy Reliability Of Mosul Dam
...Show More Authors

The way used to estimate the fuzzy reliability differs according to the nature of the information of failure time which has been dealt in this research.The information of failure times has no probable distribution to explain it , in addition it has fuzzy quality.The research includes fuzzy reliability estimation of three periods ,the first one from 1986 to 2013,the second one from 2013 to 2033 while the third one from 2033 to 2066 .Four failure time have been chosen to identify the membership function of fuzzy trapezoid represented in the pervious years after taking in consideration the estimation of most researchers, proffional    geologists and the technician who is incharge of maintaining of Mosul Dam project. B

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Random Number Generation for Quantum Key Distribution Systems Based on Shot-Noise Fluctuations in a P-I-N Photodiode
...Show More Authors

A simple setup of random number generator is proposed. The random number generation is based on the shot-noise fluctuations in a p-i-n photodiode. These fluctuations that are defined as shot noise are based on a stationary random process whose statistical properties reflect Poisson statistics associated with photon streams. It has its origin in the quantum nature of light and it is related to vacuum fluctuations. Two photodiodes were used and their shot noise fluctuations were subtracted. The difference was applied to a comparator to obtain the random sequence.

View Publication Preview PDF
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A new technique for solving fractional nonlinear equations by sumudu transform and adomian decomposition method
...Show More Authors

A novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solutio

... Show More
Publication Date
Wed Jul 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A new Technique For Solving Fractional Nonlinear Equations By Sumudu Transform and Adomian Decomposition Method
...Show More Authors

A novel technique Sumudu transform Adomian decomposition method (STADM), is employed to handle some kinds of nonlinear time-fractional equations. We demonstrate that this method finds the solution without discretization or restrictive assumptions. This method is efficient, simple to implement, and produces good results. The fractional derivative is described in the Caputo sense. The solutions are obtained using STADM, and the results show that the suggested technique is valid and applicable and provides a more refined convergent series solution. The MATLAB software carried out all the computations and graphics. Moreover, a graphical representation was made for the solution of some examples. For integer and fractional order problems, solu

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 13 2020
Journal Name
2020 Ieee International Conference On Mechatronics And Automation (icma)
A Robust Multi-Channel EEG Signals Preprocessing Method for Enhanced Upper Extremity Motor Imagery Decoding
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Sep 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
The use of the methods of the lower squares and the smaller squares weighted in the estimation of the parameters and design of the sample acceptance schemesFor general exponential distribution
...Show More Authors

The acceptance sampling plans for generalized exponential distribution, when life time experiment is truncated at a pre-determined time are provided in this article. The two parameters (α, λ), (Scale parameters and Shape parameters) are estimated by LSE, WLSE and the Best Estimator’s for various samples sizes are used to find the ratio of true mean time to a pre-determined, and are used to find the smallest possible sample size required to ensure the producer’s risks, with a pre-fixed probability (1 - P*). The result of estimations and of sampling plans is provided in tables.

Key words: Generalized Exponential Distribution, Acceptance Sampling Plan, and Consumer’s and Producer Risks

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 11 2025
Journal Name
University Of Anbar Sport And Physical Education Science Journal
The study of comparing the cognitive teaching method effect ( total and analytic ) in teaching the counter- attack of Epee
...Show More Authors

The research's aim is to place two teaching methods ( total and analytical method) and to know which one of them is better than the other in teaching the counter-attack with Epee. The researchers have used the experimental method for being considered suitable to solve the problem of the research. The sample of the research includes third –stage female students of college of physical education and sport sciences / Baghdad University in the subject of fencing, their number amounted 60 female students. It has been used SPSS for processing the results. They have concluded that the two groups of the research and the two methods (( total and analytical) have learnt the counter- attack of the two over mentioned groups. they have recommended to c

... Show More
View Publication
Publication Date
Wed Dec 11 2019
Journal Name
Journal Of The College Of Education For Women
Taking Advantage of the Modulation Method on the Manicans in sitting the Basic Template Iraqi Female Bodies
...Show More Authors

The degree of the woman’s satisfaction on clothing depends, to a large extent, on the body measurements. If clothing is very wide, it shows her enormous and if it is too tight it may draw attention to the defects of the body. It may also lead to the compatibility or incompatibility of clothing with fashion. Whatever the quality of the garment in terms of sewing and design, the costume which is not suitable for body size may affect the physical style negatively and may give the wearer an improper look. Clothing was carried out without measurements and did not use models (templates). The method of preparation affected the overall appearance because it often did not fit the shape of the body completely. Therefore, people thought in many w

... Show More
View Publication Preview PDF