Preferred Language
Articles
/
jih-1860
Determination of the Degree of Consumption (DoC) of Lube Engine Oils Using Fluorescence Spectroscopy
...Show More Authors

    The accreditation of a fast, inexpensive, and simple way to discriminate between different kinds of oils and their efficacy “degree of consumption (DoC)” has been developed. The fluorescence spectroscopy provides a reliable method for oil inspection without resorting to tedious separation.

Different new and used oil samples available in the local Iraqi market were investigated. While the challenge is to build a directory containing data of all the oils available in the local market. This method expected to control the falsified (forged) trademarks of motor oils and to discriminate between different oils.

The excitation-emission spectra of oil samples were determined in the range of 200 – 600 nm. The effect of the presence of trace metals on the fluorescence intensity of oils was considered by adding few milligrams of (Cu, Al, Fe) to the diluted oil solution. No major effect noticed on fluorescence intensity.

The research suggests installing a simple Spectrofluorometer into vehicles to check the DoC of the oil regularly and to notify the driver exactly when to replace the engine oil.

The obtained results indicate the applicability to execute such gadget to be installed in the vehicles for routine detection of the engine oil quality and its degree of consumption DoC. As well as demonstrate the potential of the technique in oil identification and could be further developed.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Complete Classification of Degree 7 for Genus 1
...Show More Authors

Assume that  is a meromorphic fuction of degree n where X is compact Riemann surface of genus g. The meromorphic function gives a branched cover of the compact Riemann surface X. Classes of such covers are in one to one correspondence with conjugacy classes of r-tuples (  of permutations in the symmetric group , in which  and s generate a transitive subgroup G of  This work is a contribution to the classification of all primitive groups of degree 7, where X is of genus one.

View Publication Preview PDF
Scopus Crossref
Publication Date
Thu May 04 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Degree of Monotone Approximation in , p Lα Spaces
...Show More Authors

The aim of this paper is to study the best approximation of unbounded functions in the
weighted spaces
,
1, 0 ,
p
p L α
α ≥>.
Key Words: Weighted space, unbounded functions, monotone approximation

View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 01 2010
Journal Name
Iraqi Journal Of Physics
An Improved Method for the Determination of Airplane Radial Velocity Using Doppler Shift
...Show More Authors

In this research velocity of moving airplane from its recorded digital sound is introduced. The data of sound file is sliced into several frames using overlapping partitions. Then the array of each frame is transformed from time domain to frequency domain using Fourier Transform (FT). To determine the characteristic frequency of the sound, a moving window mechanics is used, the size of that window is made linearly proportional with the value of the tracked frequency. This proportionality is due to the existing linear relationship between the frequency and its Doppler shift. An algorithm was introduced to select the characteristic frequencies, this algorithm allocates the frequencies which satisfy the Doppler relation, beside that the tra

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The application target cost technique by using reverse engineering: An application study in the general company for vegetable oils industry
...Show More Authors

The Purpose of this study is mainly to improve the competitive position of products economic units using technique target cost and method reverse engineering and through the application of technique and style on one of the public sector companies (general company for vegetable oils) which are important in the detection of prices accepted in the market for items similar products and processing the problem of high cost which attract managerial and technical leadership to the weakness that need to be improved through the introduction of new innovative solutions which make appropriate change to satisfy the needs of consumers in a cheaper way to affect the decisions of private customer to buy , especially of purchase private economic units to

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
Improvement of energy consumption in MIMO with cognitive radio networks
...Show More Authors

The employment of cognitive radio (CR) is critical to the successful development of wireless communications. In this field, especially when using the multiple input multiple output (MIMO) antenna technology, energy consumption is critical. If the principal user (PU) is present, developers can utilize the energy detecting approach to tell. The researchers employed two distinct phases to conduct their research: the intense and accurate sensing stages. After the furious sensing step was completed, the PU user was identified as having a maximum or minimal energy channel. There are two situations in which the proposed algorithm's performance is tested: channels for fading AWGN and Rayleigh. When the proposed methods' simulation results a

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
A comparison Of Some Semiparametric Estimators For consumption function Regression
...Show More Authors

    This article aims to explore the importance of estimating the a semiparametric regression function ,where we suggest a new estimator beside the other combined estimators and then we make a comparison among them by using simulation technique . Through the simulation results we find  that the suggest estimator is the best with the first and second models ,wherealse for the third model we find Burman and Chaudhuri (B&C) is best.

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Extension of Cap by Size and Degree in the Space PG(3,11)‎
...Show More Authors

A cap of size  and degree  in a projective space, (briefly; (k,r)-cap) is a set of  points with the property that each line in the space meet it in at most  points. The aim of this research is to extend the size and degree of complete caps and incomplete caps, (k, r)-caps of degree r<12 in the finite projective space of dimension three over the finite field of order eleven, which already exist and founded by the action of subgroups of the general linear group over the finite field of order eleven and degree four, to (k+i,r+1) -complete caps. These caps have been classified by giving the t_i-distribution and -distribution. The Gap programming has been used to execute the designed algorit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
New Operational Matrices of Seventh Degree Orthonormal Bernstein Polynomials
...Show More Authors

Based on analyzing the properties of Bernstein polynomials, the extended orthonormal Bernstein polynomials, defined on the interval [0, 1] for n=7 is achieved. Another method for computing operational matrices of derivative and integration D_b and R_(n+1)^B respectively is presented. Also the result of the proposed method is compared with true answers to show the convergence and advantages of the new method.

View Publication Preview PDF
Crossref