The use of Cosine transform to analyze the model-noise pattern alteration with different vibration model applied on multimode fiber optics are studied. It's results compared with the Fourier transform to perform the same analysis using total frequency difference and the computation time, which almost coincide for the both transforms. A discussion for the results and recommendation are introduced.
The aim of this study is to achieve the best distinguishing function of the variables which have common characteristics to distinguish between the groups in order to identify the situation of the governorates that suffer from the problem of deprivation. This allows the parties concerned and the regulatory authorities to intervene to take corrective measures. The main indicators of the deprivation index included (education, health, infrastructure, housing, protection) were based on 2010 data available in the Central Bureau of Statistics
In real world, almost all networks evolve over time. For example, in networks of friendships and acquaintances, people continually create and delete friendship relationship connections over time, thereby add and draw friends, and some people become part of new social networks or leave their networks, changing the nodes in the network. Recently, tracking communities encountering topological shifting drawn significant attentions and many successive algorithms have been proposed to model the problem. In general, evolutionary clustering can be defined as clustering data over time wherein two concepts: snapshot quality and temporal smoothness should be considered. Snapshot quality means that the clusters should be as precise as possible durin
... Show MoreCompounds from tin oxide doped with gallium oxide and cerium oxide were synthesized. Thin films from (SnO2:Ga2O3,CeO2) with different doping ratios were prepared on glass and single crystal silicon as substrates with the use of the pulsed laser deposition technique. The results of FTIR spectrums analysis was presented. Varies heterojunctions were fabricated from (SnO2:Ga2O3,CeO2 /Cu2S/c-pSi) heterojunctions solar cell which are formed from two layers: the first was Cu2S and the second was layer from tin oxide doped with two oxides named gallium oxide and cerium oxide with different doping ratios (0, 0.03, 0.05, and 0.0
... Show MoreIn this research an analysis for improving the fatigue behavior (safety factor of fatigue) of non- articular prosthetic foot (SACH) in the region (Bolt Adapter).The laser peening was carried to the fatigue specimens to improving the fatigue properties of bolt’s material. The tests of mechanical properties and fatigue behavior were carried for material that the bolt manufacture from it, a region where the failure occur and inserted of these properties to the program of engineering analysis (Ansys) to calculate the safety factor of fatigue. The results showed that the safety factor after hardening by laser is increased by 42.8%.
In this work, enhancement to the fluorescence characteristics of laser dye solutions hosting highly-pure titanium dioxide nanoparticles as random gain media. This was achieved by coating two opposite sides of the cells containing these media with nanostructured thin films of highly-pure titanium dioxide. Two laser dyes; Rhodamine B and Coumarin 102, were used to prepare solutions in hexanol and methanol, respectively, as hosts for the nanoparticles. The nanoparticles and thin films were prepared by dc reactive magnetron sputtering technique. The enhancement was observed by the narrowing of fluorescence linewidth as well as by increasing the fluorescence intensity. These parameters were compared to those of the dye only and the dye solution
... Show MoreThe security of multimedia data becoming important spatial data of monitoring systems that contain videos prone to attack or escape via the internet, so to protect these videos used proposed method combined between encryption algorithm and sign algorithm to get on authenticated video. The proposed encryption algorithm applied to secure the video transmission by encrypt it to become unclear. This done by extract video to frames and each frame separate to three frames are Red, Green, and Blue, this frames encrypt by using three different random keys that generated by a function for generating random numbers, as for sign algorithm applied for authentication purpose that enable the receiver from sure of the identity of the sender and provide
... Show MoreSeismic instantaneous phase attribute was applied for conventional seismic interpretation (structural interpretation) on 3D seismic cube of 1914.72km² of Samawa-Diwan area, located in the south part of Iraq within Muthna governorate. Instantaneous phase section is very important to detect structural and stratigraphic features. Six reflectors represent Upper Jurassic and Cretaceous formations were defined from synthetic seismogram of wells in study area, then picked over seismic cube. Fault boundaries maps for each horizon were drawn depending on horizon contacts then fault planes were constructed. Finally, a 3D structural model was constructed in time domain, then converted to depth domain by using 3D average velocity model. Structurall
... Show MoreThrough recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show MoreThis paper proposed a new method to study functional non-parametric regression data analysis with conditional expectation in the case that the covariates are functional and the Principal Component Analysis was utilized to de-correlate the multivariate response variables. It utilized the formula of the Nadaraya Watson estimator (K-Nearest Neighbour (KNN)) for prediction with different types of the semi-metrics, (which are based on Second Derivative and Functional Principal Component Analysis (FPCA)) for measureing the closeness between curves. Root Mean Square Errors is used for the implementation of this model which is then compared to the independent response method. R program is used for analysing data. Then, when the cov
... Show MoreThe current study aims to compare between the assessments of the Rush model’s parameters to the missing and completed data in various ways of processing the missing data. To achieve the aim of the present study, the researcher followed the following steps: preparing Philip Carter test for the spatial capacity which consists of (20) items on a group of (250) sixth scientific stage students in the directorates of Baghdad Education at Al–Rusafa (1st, 2nd and 3rd) for the academic year (2018-2019). Then, the researcher relied on a single-parameter model to analyze the data. The researcher used Bilog-mg3 model to check the hypotheses, data and match them with the model. In addition
... Show More