Preferred Language
Articles
/
jeasiq-1518
حول أسلوب تحليل التغاير المتعدد باستخدام تصميم قطع منشقة
...Show More Authors

Analysis of Covariance consider to be quite important procedure to reduce the effect of some independents factors before going through the experiment.

By this procedure we can compare variances causes from the difference between treatments and error term variance of they are equals or less than consider to be not significant, otherwise if is significant.

We carry on with this comparison until we find the greatest covser for the significant variance flam the treatments.

There are methods can be used like least significant difference method, Duncan method and Turkeys' w-procedure and Student Newman.

Key Word: Analysis of variation; Split plot design; Repeated  

                    Measurements.

 

 

 

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
Geolocation Android Mobile Phones Using GSM/UMTS
...Show More Authors

The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location AP

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Wear Behavior Performance of Polymeric Matrix Composites Using Taguchi Experiments
...Show More Authors

This research estimates the effect of independent factors like filler  (3%, 6%, 9%, 11% weight fraction), normal load (5N, 10N, 15N), and time sliding (5,7 , 9 minutes) on wear behavior of unsaturated polyester resin reinforced with jute fiber and waste eggshell and, rice husk powder composites by utilizing a statistical approach. The specimens polymeric composite prepared from resin unsaturated polyester filled with (4% weight fraction) jute fiber, and (3%, 6%, 9%, 11% weight fraction) eggshell, and rice husk by utilizing (hand lay-up) molding. Dry sliding wear experiments were carried utilizing a standard (pin on disc test setup) following a well designed empirical schedule that depends on Taguchi’s experimental design L9 (MINIT

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Classification of Diseases in Oil Palm Leaves Using the GoogLeNet Model
...Show More Authors

The general health of palm trees, encompassing the roots, stems, and leaves, significantly impacts palm oil production, therefore, meticulous attention is needed to achieve optimal yield. One of the challenges encountered in sustaining productive crops is the prevalence of pests and diseases afflicting oil palm plants. These diseases can detrimentally influence growth and development, leading to decreased productivity. Oil palm productivity is closely related to the conditions of its leaves, which play a vital role in photosynthesis. This research employed a comprehensive dataset of 1,230 images, consisting of 410 showing leaves, another 410 depicting bagworm infestations, and an additional 410 displaying caterpillar infestations. Furthe

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Designing and Application of Mathematical Model A Multi – Objectives for Assessment The Quality Of The Project : A Case Study at Saad Public Construction Company
...Show More Authors

Abstract

This research aims to design a multi-objective mathematical model to assess the project quality based on three criteria: time, cost and performance. This model has been applied in one of the major projects formations of the Saad Public Company which enables to completion the project on time at an additional cost that would be within the estimated budget with a satisfactory level of the performance which match with consumer requirements. The problem of research is to ensure that the project is completed with the required quality Is subject to constraints, such as time, cost and performance, so this requires prioritizing multiple goals. The project

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 20 2019
Journal Name
Al-khwarizmi Engineering Journal
Design and Simulation of Closed Loop Proportional Integral (PI) Controlled Boost Converter and 3-phase Inverter for Photovoltaic (PV) Applications
...Show More Authors

This research deals with the design and simulation of a solar power system consisting of a KC200GT solar panel, a closed loop boost converter and a three phase inverter by using Matlab / Simulink. The mathematical equations of the solar panel design are presented. The electrical characteristics of the panel are tested at the values ​​of 1000  for light radiation and 25 °C for temperature environment. The Proportional Integral (PI) controller is connected   as feedback with the Boost converter to obtain a stable output voltage by reducing the oscillations in the voltage to charge a battery connected to the output of the converter. Two methods (Particle Swarm Optimization (PSO) and Zeigler- Nichols) are used for tuning

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Economics And Administrative Sciences
Eliminate harmful side – effects of Controls System by designing Activity – Based Responsibility Accounting model
...Show More Authors

This research has come out with that, function-based responsibility accounting system has harmful side – effects preventing it of achieving its controlling objective, that is, goal congruence, which are due to its un integrated measures, its focus on measuring measurable behaviors while neglecting behaviors that are hardly measured, and its dependence on standard operating procedures.

In addition, the system hypotheses and measures are designed to fit previous business environment, not the current environment.

The research has also concluded that the suggestive model, that is, activity-based responsibility accounting is designed to get ride of harmful side – effects of functi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref