Preferred Language
Articles
/
jih-1566
Astudy and Analysis of Geomagnetic Field By using Model of International Geomagnetic Reference Field (IGRF- 2000)
...Show More Authors

The IGRF model is the empirical representation of the Earth magnetic field recommended for scientific use by the International Association of Geomagnetism and Aeronomy(IAGA).

Since  the  Geomagnetic   field   has   the  abi lity  to   change  the orientation of satellite, the strength of Geomagnetic field and its horizontal component have been studied.

This paper discusses the phenomenon of the Geomagnetic field intensity and its horizontal component at diferent altitudes and at certain latitudes, the geomagnetic field data is obtained by using IGRF2000 model at Baghdad (44.7 degree East longitude) .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Reducing Lost Circulation Problem by Using Rice Material
...Show More Authors

Drilling fluid loss during drilling operation is undesirable, expensive and potentially hazardous problem.

    Nasiriyah oil field is one of the Iraqi oil field that suffer from lost circulation problem. It is known that Dammam, um-Radoma, Tayarat, Shiranish and Hartha are the detecting layers of loss circulation problem. Different type of loss circulation materials (LCMs) ranging from granular, flakes and fibrous were used previously to treat this problem.  

    This study presents the application of rice as a lost circulation material that used to mitigate and stop the loss problem when partial or total losses occurred.

     The experim

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 06 2009
Journal Name
Baghdad Science Journal
Decoding Reed- Muller Codes by Using Hadamard Matrices
...Show More Authors

This paper discusses the problem of decoding codeword in Reed- Muller Codes. We will use the Hadamard matrices as a method to decode codeword in Reed- Muller codes.In addition Reed- Muller Codes are defined and encoding matrices are discussed. Finally, a method of decoding is explained and an example is given to clarify this method, as well as, this method is compared with the classical method which is called Hamming distance.

View Publication Preview PDF
Crossref
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Solving Fuzzy Differential Equations by Using Power Series
...Show More Authors

In this paper, the series solution is applied to solve third order fuzzy differential equations with a fuzzy initial value. The proposed method applies Taylor expansion in solving the system and the approximate solution of the problem which is calculated in the form of a rapid convergent series; some definitions and theorems are reviewed as a basis in solving fuzzy differential equations. An example is applied to illustrate the proposed technical accuracy. Also, a comparison between the obtained results is made, in addition to the application of the crisp solution, when the-level equals one.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Attack Stream Cipher By Using Cipher System Only
...Show More Authors

Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.

 

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Intelligent Systems And Computing
Forecasting by Using the Optimal Time Series Method
...Show More Authors

View Publication
Scopus (15)
Crossref (5)
Scopus Crossref
Publication Date
Sun Mar 04 2018
Journal Name
Baghdad Science Journal
Solving Fuzzy Games Problems by Using Ranking Functions
...Show More Authors

In this paper, we deal with games of fuzzy payoffs problem while there is uncertainty in data. We use the trapezoidal membership function to transform the data into fuzzy numbers and utilize the three different ranking function algorithms. Then we compare between these three ranking algorithms by using trapezoidal fuzzy numbers for the decision maker to get the best gains

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jan 10 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
Enhancement the Educational Technology by Using 5G Networks
...Show More Authors

With the spread of global markets for modern technical education and the diversity of programs for the requirements of the local and global market for information and communication technology, the universities began to race among themselves to earn their academic reputation. In addition, they want to enhance their technological development by developing IMT systems with integrated technology as the security and fastest response with the speed of providing the required service and sure information and linking it The network and using social networking programs with wireless networks which in turn is a driver of the emerging economies of technical education. All of these facilities opened the way to expand the number of students and s

... Show More
View Publication
Scopus (30)
Crossref (8)
Scopus Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Meta Gene
Association analysis of FTO gene polymorphisms rs9939609 and obesity risk among the adults: A systematic review and meta-analysis
...Show More Authors

View Publication
Scopus (9)
Scopus
Publication Date
Wed Feb 20 2019
Journal Name
Political Sciences Journal
North Korea's nuclear program is facing the International Atomic Energy Agency (IAEA)
...Show More Authors

لخلاصة Nuclear energy is among the most important discoveries reached by the human terms contributed to the solution of many problems faced by the states. The last of these that are not only utilizing it in a peaceful area, but tended toward the military field and the nuclear weapons industry , Among these countries, we find North Korea, which has openly declared their manufacture of nuclear weapons and thus entry to the club of nuclear countries. International Atomic Energy Agency has worked to resolve the North Korea standoff but has not been able to achieve positive results, prompting the intervention of European countries in order to end the crisis. تعدُّ الطاقة النووية من بين أهم الاستكشافا

... Show More
View Publication Preview PDF
Crossref