Preferred Language
Articles
/
ijs-6449
Re-Distribution of the Regions of 100 Comets Using a Statistical Method
...Show More Authors

     In this study, the comets have distributions regarding their heliocentric distances where they appear in two regions, Kuiper belt (short period) and Oort cloud (long period). Details here give new information about the entire regions of these comets; the research shows that 54% of comets are nearby asteroid belt, but only 11% are in Kuiper belts and 35 % are from Oort cloud. The research focuses on comets with a nucleus's radius larger than 1 km.  The comets with a nuclear radius of 1-10 km have high percentage 51%.

         From the results, the maximum comets' radius is found in comet 29P/Schwassmann -Wachmann as roughly 87 km, and also in comet C/2018 N2 (ASASSN) which has radius 88 km. All comets, that have been distributed concerning heliocentric, depend on statistical results to divide new comets' regions versus their radiuses. The results reveal new details of comets' distances from the sun. The distances of 100 comets are shown in Figure (2).

The results show that there is a third comets' region: region (A) found between Mars and Saturn and between Oort cloud and Kuiper belt.

   There is one comet like(C/2019 L3 (ATLAS)) that is farther than Alpha Centauri star. Therefore, the comet is restricted by a couple of gravity systems.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 06 2015
Journal Name
16th Conference In Natural Science And Mathematics
Efficient digital Image filtering method based on fuzzy algorithm
...Show More Authors

Recently, Image enhancement techniques can be represented as one of the most significant topics in the field of digital image processing. The basic problem in the enhancement method is how to remove noise or improve digital image details. In the current research a method for digital image de-noising and its detail sharpening/highlighted was proposed. The proposed approach uses fuzzy logic technique to process each pixel inside entire image, and then take the decision if it is noisy or need more processing for highlighting. This issue is performed by examining the degree of association with neighboring elements based on fuzzy algorithm. The proposed de-noising approach was evaluated by some standard images after corrupting them with impulse

... Show More
View Publication
Publication Date
Tue Jan 04 2022
Journal Name
Iraqi Journal Of Science
Text Compression & Encryption Method Based on RNA and MTF
...Show More Authors

The sending of information at the present time requires the speed and providing protection for it. So compression of the data is used in order to provide speed and encryption is used in order to provide protection. In this paper a proposed method is presented in order to provide compression and security for the secret information before sending it. The proposed method based on especial keys with MTF transform method to provide compression and based on RNA coding with MTF encoding method to provide security. The proposed method based on multi secret keys. Every key is designed in an especial way. The main reason in designing these keys in special way is to protect these keys from the predication of the unauthorized users.

View Publication Preview PDF
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Unsupervised Segmentation Method for Thyroid Nodules in Ultrasound Images
...Show More Authors

Thyroid is a small butterfly shaped gland located in the front of the neck just below the Adams apple. Thyroid is one of the endocrine gland, which produces hormones that help the body to control metabolism. A different thyroid disorder includes Hyperthyroidism, Hypothyroidism, and thyroid nodules (benign/malignant). Ultrasound imaging is most commonly used to detect and classify abnormalities of the thyroid gland. Segmentation method is a tool that used widely in many applications including medical image processing. One of the common applications of segmentation is in medical image analysis for clinical diagnosis that has an important role in terms of quality and quantity.
The main objective of this research is to use the Computer-Ai

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 19 2019
Journal Name
Iraqi Journal Of Science
Efficient Iterative Method for Solving Korteweg-de Vries Equations
...Show More Authors

The Korteweg-de Vries equation plays an important role in fluid physics and applied mathematics. This equation is a fundamental within study of shallow water waves. Since these equations arise in many applications and physical phenomena, it is officially showed that this equation has solitary waves as solutions, The Korteweg-de Vries equation is utilized to characterize a long waves travelling in channels. The goal of this paper is to construct the new effective frequent relation to resolve these problems where the semi analytic iterative technique presents new enforcement to solve Korteweg-de Vries equations. The distinctive feature of this method is, it can be utilized to get approximate solutions for travelling waves of 

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Tue Apr 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Sumudu Iterative Method for solving Nonlinear Partial Differential Equations
...Show More Authors

       In this paper, we apply a new technique combined by a Sumudu transform and iterative method called the Sumudu iterative method for resolving non-linear partial differential equations to compute analytic solutions. The aim of this paper is to construct the efficacious frequent relation to resolve these problems. The suggested technique is tested on four problems. So the results of this study are debated to show how useful this method is in terms of being a powerful, accurate and fast tool with a little effort compared to other iterative methods.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
New Improved Heuristic Method for Solving Travelling Salesman Problem
...Show More Authors

In this paper we will investigate some Heuristic methods to solve travelling salesman problem. The discussed methods are Minimizing Distance Method (MDM), Branch and Bound Method (BABM), Tree Type Heuristic Method (TTHM) and Greedy Method (GRM).

The weak points of MDM are manipulated in this paper. The Improved MDM (IMDM) gives better results than classical MDM, and other discussed methods, while the GRM gives best time for 5≤ n ≤500, where n is the number of visited cities.

View Publication Preview PDF
Publication Date
Mon Dec 30 2024
Journal Name
Modern Sport
Mechanical angle foot during jumping and correct landing method
...Show More Authors

This article investigates the relationship between foot angle and jump stability, focusing on minimizing injury risk. Here are the key points: Importance: Understanding foot angle is crucial for improving jump stability, athletic performance, and reducing jump-related injuries like ankle sprains. Ideal Foot Angle: Research suggests a forward foot angle of around 15 degrees might be ideal for many people during jumps. This angle distributes forces evenly across the foot, lowers the center of gravity, and provides more surface area for pushing off the ground. Factors Affecting Ideal Angle: The optimal angle can vary depending on the type of jump (vertical vs. long jump), fitness level, and personal preference. Incorrect Foot Angles: Landing w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 16 2022
Journal Name
Iraqi Journal Of Science
Text Steganography Method Based On Modified Run Length Encoding
...Show More Authors

Data hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Exponentially Fitted Diagonally Implicit EDITRK Method for Solving ODEs
...Show More Authors

This paper derives the EDITRK4 technique, which is an exponentially fitted diagonally implicit RK method for solving ODEs . This approach is intended to integrate exactly initial value problems (IVPs), their solutions consist of linear combinations of the group functions  and  for exponentially fitting  problems, with  being the problem’s major frequency utilized to improve the precision of the method. The modified  method EDITRK4 is a new three-stage fourth-order exponentially-fitted diagonally implicit approach for solving IVPs with functions that are exponential as solutions. Different forms of -order ODEs must be derived using the modified system, and when the same issue is reduced to a  framework of equations that can be sol

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Runge-kutta Numerical Method for Solving Nonlinear Influenza Model
...Show More Authors
Abstract<p>The main object of this study is to solve a system of nonlinear ordinary differential equations (ODE) of the first order governing the epidemic model using numerical methods. The application under study is a mathematical epidemic model which is the influenza model at Australia in 1919. Runge-kutta methods of order 4 and of order 45 for solving this initial value problem(IVP) problem have been used. Finally, the results obtained have been discussed tabularly and graphically.</p>
View Publication
Scopus (4)
Crossref (1)
Scopus Crossref