Preferred Language
Articles
/
jcois-1097
Methodological fundations for narrators of Sunan
...Show More Authors

بحث لمعرفة رواة السنن والمسانيد للحافظ ابن نقطة

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 17 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Multiproduct Mathematical Model for Productive Company
...Show More Authors

This model is an extension to H.M.M.S and related developments models of a single product. These models will be converted to deal with Multiproduct for productive company. This model executed by computer programming technique to maximize profits

View Publication Preview PDF
Publication Date
Thu Jul 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Score for the Group SL(2,38)
...Show More Authors

        The set of all (n×n) non-singular matrices over the field F. And this set forms a group under the operation of matrix multiplication. This group is called the general linear group of dimension  over the field F, denoted by . The determinant of these matrices is a homomorphism from  into F* and the kernel of this homomorphism was the special linear group and denoted by  Thus  is the subgroup of  which contains all matrices of determinant one.

The rationally valued characters of the rational representations are written as a linear combination of the induced characters for the groups discussed in this paper. We find the Artin indicator for this group after studying the rationally valued characters of the rational

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Mar 30 2003
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Mathematical Model for Multicomponent Distillation Column
...Show More Authors

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
Wavelet compression for remotely sensed images
...Show More Authors

Image compression is very important in reducing the costs of data storage transmission in relatively slow channels. Wavelet transform has received significant attention because their multiresolution decomposition that allows efficient image analysis. This paper attempts to give an understanding of the wavelet transform using two more popular examples for wavelet transform, Haar and Daubechies techniques, and make compression between their effects on the image compression.

View Publication Preview PDF
Publication Date
Fri Mar 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Computer Aided Design for Spray Driers
...Show More Authors

The aim of this work is to develop an axi-symmetric two dimensional model based on a coupled simplified computational fluid dynamics (CFD) and Lagrangian method to predict the air flow patterns and drying of particles.  Then using this predictive tool to design more efficient spray dryers. The approach to this is to model what particles experience in the drying chamber with respect to air temperature and humidity. These histories can be obtained by combining the particles trajectories with the air temperature/humidity pattern in the spray dryer. Results are presented and discussed in terms of the air velocity, temperature, and humidity profiles within the chambers and compared for drying of a 42.5% solids solution in a spray chamber

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2007
Journal Name
Journal Of Economics And Administrative Sciences
Wavelet Analysis For Sunspot Time Series
...Show More Authors

Abstract

In this research we study the wavelet characteristics for the important time series known as Sunspot, on the aim of verifying the periodogram that other researchers had reached by the spectral transform, and noticing the variation in the period length on one side and the shifting on another.

A continuous wavelet analysis is done for this series and the periodogram in it is marked primarily. for more accuracy, the series is partitioned to its the approximate and the details components to five levels, filtering these components by using fixed threshold on one time and independent threshold on another, finding the noise series which represents the difference between

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
Adaptive Coded Modulation for OFDM System
...Show More Authors

This paper studies the adaptive coded modulation for coded OFDM system using punctured convolutional code, channel estimation, equalization and SNR estimation. The channel estimation based on block type pilot arrangement is performed by sending pilots at every sub carrier and using this estimation for a specific number of following symbols. Signal to noise ratio is estimated at receiver and then transmitted to the transmitter through feedback channel ,the transmitter according to the estimated SNR select appropriate modulation scheme and coding rate which maintain constant bit error rate
lower than the requested BER. Simulation results show that better performance is confirmed for target bit error rate (BER) of (10-3) as compared to c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Progress In Electromagnetics Research C
BANDWIDTH OPTIMISATION FOR SEMICONDUCTOR JUNCTION CIRCULATORS
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Mon Sep 01 2014
Journal Name
Proceedings Of Ieee East-west Design & Test Symposium (ewdts 2014)
Qubit method for diagnosing digital systems
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Modifying Hebbian Network for Text Cipher
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights

... Show More
View Publication Preview PDF
Crossref