Preferred Language
Articles
/
jih-402
Design an Algorithm to Calculate the Inverse Permutations Of the Symmetric Group Sn In Computer
...Show More Authors

  The search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jul 31 2022
Journal Name
Iraqi Journal Of Science
nC-symmetric operators
...Show More Authors

In this paper, we present a concept of nC- symmetric operator as  follows: Let A be a bounded linear operator on separable complex Hilbert space , the operator A is said to be nC-symmetric if there exists a positive number n (n  such that CAn = A* C (An = C A* C). We provide an example and study the basic properties of this class of operators. Finally, we attempt to describe the relation between nC-symmetric operator and some other operators such as Fredholm and self-adjoint operators.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Chem Tech Research
theoretical study to calculate some parameters of ion optical system
...Show More Authors

Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Design of an Efficient Face Recognition Algorithm based on Hybrid Method of Eigen Faces and Gabor Filter
...Show More Authors

Face recognition is one of the most applications interesting in computer vision and pattern recognition fields. This is for many reasons; the most important of them are the availability and easy access by sensors. Face recognition system can be a sub-system of many applications. In this paper, an efficient face recognition algorithm is proposed based on the accuracy of Gabor filter for feature extraction and computing the Eigen faces. In this work, efficient compressed feature vector approach is proposed. This compression for feature vector gives a good recognition rate reaches to 100% and reduced the complexity of computing Eigen faces. Faces94 data base was used to test method.

View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
ON SN-SPACES
...Show More Authors

The aim of this paper is to introduce and study the concept of SN-spaces via the notation of simply-open sets as well as to investigate their relationship to other topological spaces and give some of its properties.

View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Engineering
New Correlation To Calculate Absolute Permeability From Gas Permeameter
...Show More Authors

In this study, two correlations are developed to calculate absolute rocks permeability from core samples tested by Gas Permeameter Apparatus. The first correlation can be applied if K g≤100, the second correlation can be applied if Kg>100. Sixty core samples having different permeabilities to give a wide range of values that necessary to achieve a correlation.

 

The developed correlation is easily applied and a quick method to avoid repeating the test at different pressure values. Only one pressure test is required to reach absolu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Advances In Mechanical Engineering
3D-shape formation of blood vessels based on computer aided design system
...Show More Authors

This paper proposes and tests a computerized approach for constructing a 3D model of blood vessels from angiogram images. The approach is divided into two steps, image features extraction and solid model formation. In the first step, image morphological operations and post-processing techniques are used for extracting geometrical entities from the angiogram image. These entities are the middle curve and outer edges of the blood vessel, which are then passed to a computer-aided graphical system for the second phase of processing. The system has embedded programming capabilities and pre-programmed libraries for automating a sequence of events that are exploited to create a solid model of the blood vessel. The gradient of the middle c

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Iraqi Journal Of Physics
A computer experiment to study the charging process of dust grains in negative ion plasma
...Show More Authors

This work presents a computer studying to simulate the charging process of a dust grain immersed in plasma with negative ions. The study based on the discrete charging model. The model was developed to take into account the effect of negative ions on charging process of dust grain.
The model was translated to a numerical calculation by using computer programs. The program of model has been written with FORTRAN programming language to calculate the charging process for a dust particle in plasma with negative ion, the time distribution of a dust charge, number charge equilibrium and charging time for different value of ηe (ratio of number density of electron to number density of positive ion).

View Publication Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
A New Bayesian Group Bridge to Solve the Tobit Model
...Show More Authors

In this paper, we propose a new approach of regularization for the left censored data (Tobit). Specifically, we propose a new Bayesian group Bridge for left-censored regression ( BGBRLC). We developed a new Bayesian hierarchical model and we suggest a new Gibbs sampler for posterior sampling. The results show that the new approach performs very well compared to some existing approaches.

View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Opcion
Analysis of Computer Textbook for the Second Intermediate Grade According to Digital Citizenship
...Show More Authors

The research aims to build a list of digital citizenship axes and standards and indicators emanating from them, which should be included in the content of the computer textbook scheduled for second grade intermediate students in Iraq, and the analysis of the above mentioned book according to the same list using the descriptive analytical method ((method of content analysis)). The research community and its sample consisted of the content of the computer textbook scheduled for the second year intermediate students for the academic year 2018-2019, and the research tool was built in its initial form after reference to a set of specialized literature and previous studies that dealt with topics related to digital citizenship, and the authenticit

... Show More
Preview PDF
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Risk Analysis in Group Life Insurance: An Applied Research in the General Iraqi Insurance Company
...Show More Authors

Insurance actions has become a task of the vital foundations on    which the international economy depends, where its presence helped in the development of economic resources in which human resource is considered the most important of these resources. Insurance companies play the biggest role in protecting this resource and minimizing the impact of the dangers that verify this condition.Human has worked hard to get rid of the dangers and its harm, and to devise many ways to prevent them. A risk management is considered within human’s creations in order to create a society with fewer negative risks impacts.

                On this basis, th

... Show More
View Publication Preview PDF