Preferred Language
Articles
/
jih-397
The Construction of Complete (kn,n)-Arcs in The Projective Plane PG(2,11) by Geometric Method, with the Related Blocking Sets and Projective Codes
...Show More Authors

   In this paper,we construct complete (kn,n)-arcs in the projective plane PG(2,11),  n = 2,3,…,10,11  by geometric method, with the related blocking sets and projective codes.
 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
αg_Ị-open sets and αg_Ị-functions
...Show More Authors

     The objective of this paper is to show modern class of open sets which is an -open. Some functions via this concept were studied and the relationships such as continuous function strongly -continuous function -irresolute function -continuous function.

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis and study the Structural and electrical and mechanical properties of High Temperature Superconductor Tl0.5Pb0.5Ba2Can-1Cun-xNixO2n+3-δ Substituted with nickel oxide for n=3
...Show More Authors

   on this research is to study the effect of nickel oxide substitution on the pure phases superconductor Tl0.5Pb0.5Ba2Can-1Cun-xNixO2n+3-δ (n=3) where x=(0,0.2,0.4,0.6,0.8.and 1.0). The specimens in this work were prepared with used  procedure of solid state reaction with sintering temperature 8500C for 24 h .we used technical (4-prob)to calculated and the critical temperature Tc . The results of the XRD diffraction analysis showed that the structure for pure and doped phases was tetragonal with phases high-Tc phase (1223),(1212) and low-Tc phase (1202)  and add

... Show More
View Publication Preview PDF
Crossref (26)
Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Weak Forms of Soft (1, 2)*-Omega Open Sets in Soft Bitopological Spaces
...Show More Authors

 In this paper, we introduce  and  study  new  classes of soft  open  sets  in soft bitopological spaces called soft  (1,2)*-omega  open  sets  and  weak forms of soft (1,2)*-omega open sets such as soft  (1,2)*-α-ω-open sets, soft  (1,2)*-pre-ω-opensets, soft  (1,2)*-b-ω-open sets,  and  soft  (1,2)*-β-ω-open  sets. Moreover; some basic properties and the relation among these concepts and other concepts also have been studied.

View Publication Preview PDF
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Creating a Conductive Surface of the PMMA by Laser Cladding with DWCNT and MWCNTS
...Show More Authors

This work studied the electrical and thermal surface conductivity enhancement of polymethylmethacrylate (PMMA) clouded by double-walled carbon nanotubes (DWCNTs) and multi-walled carbon nanotube (MWCNTs) by using pulsed Nd:YAG laser. Variable input factors are considered as the laser energy (or the relevant power), pulse duration and pulse repetition rate. Results indicated that the DWCNTs increased the PMMA’s surface electrical conductivity from 10-15 S/m to 0.813×103 S/m while the MWCNTs raised it to 0.14×103 S/m. Hence, the DWCNTs achieved an increase of almost 6 times than that for the MWCNTs. Moreover, the former increased the thermal conductivity of the surface by 8 times and the later by 5 times.

View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Notes On The Non Linear Operator Equation I AXAX n
...Show More Authors

Necessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.

Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (12)
Crossref (5)
Scopus Crossref
Publication Date
Fri Jan 29 2016
Journal Name
Al- Mustansiriyah J. Sci.
The Approximate Solution of Newell Whitehead Segel and Fisher Equations Using The Adomian Decomposition Method
...Show More Authors

In the present work, we use the Adomian Decomposition method to find the approximate solution for some cases of the Newell whitehead segel nonlinear differential equation which was solved previously with exact solution by the Homotopy perturbation and the Iteration methods, then we compared the results.

View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Calculating the Vertical Displacement using the Method of Least Squares Adjustment and 3D Objects Fitting
...Show More Authors
Abstract<p>In this research, the Iraqi flagpole at Baghdad University, which is the longest in Baghdad, with a height of 75m, was monitored. According to the importance of this structure, the calculation of the displacement (vertical deviation) in the structure was monitored using the Total Station device, where several observations were taken at different times for two years the monitoring started from November 2016 until May 2017, at a rate of four observations for one year. The observation was processed using the least square method, and the fitting of circles, and then the data was processed. The deviation was calculated using the Matlab program to calculate the values of corrections, where </p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Use the method of parsing anomalous valueIn estimating the character parameter
...Show More Authors

In this paper the method of singular value decomposition  is used to estimate the ridge parameter of ridge regression estimator which is an alternative to ordinary least squares estimator when the general linear regression model suffer from near multicollinearity.

View Publication Preview PDF
Crossref