Preferred Language
Articles
/
jih-743
A Complete (k,r)-Cap in PG(3,p) Over Galois Field GF(4)

   The aim of this paper is to construct the (k,r)-caps in the projective 3-space PG(3,p) over Galois field GF(4). We found that the maximum complete (k,2)-cap which is called an                       ovaloid  , exists in PG(3,4) when k = 13. Moreover the maximum (k,3)-caps, (k,4)-caps and   (k,5)-caps. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Synthesis & Characterization of Some 1, 3, 4-OxadiazoleDerivatives & new Cyclic Imides from Creatinine

A series of new 1,3,4- oxadiazole derivatives and cyclic Imides containing Creatinine
heterocyclic molecule were prepared via following method:first step included Synthesis of
amic acid from reaction between different cyclic anhydrides with Creatinine which
subsequently dehydrated to the corresponding imide via treatment with acetic anhydride
and anhydrous sodium acetate,.then,second step was tratedamic acid with Thionyl chloride
producing acid chloride which on amination with hydrazine hydrate in thierd step and the
last turn to 1,3,4-oxadiazole derivatives by condensation reaction with Phosphorous
Oxychloride(POCl3) and different benzoic acids. Cyclization to 1, 3, 4-Oxadiazole
derivatives. Antibacterial activit

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2008
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Complete Rectal Prolapse

Background and Objective:
There are many treatment modalities in managing complete rectal prolapse (CRP) current study present simple technique of cauterization plication operation in the treatment
of complete rectal prolapse.
Methods:
The study include 30 patients present with CRP their mean age (74.3 ± 4.6), 19 females and 11 males. With the patient under- general anesthesia in litliotomy position the
proolapsed rectum pulled outside the anal canal, the mucosa was cauterized, the muscle layer was plicated by 2/0 dixon suture. Posterior levtorplasty were done in 10 adult patients
when it is indicated.
Results:
The postoperative follow up was 12-24 months. Six had postoperative mucosal prolaps

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
J. Of University Of Anbar For Pure Science
Synthesis, spectral Characterization and studies of Some Divalent Metal Ion Complexes with Ligand of [3-(1H-indol- 3-yl)-2-(3-(4-methoxybenzoyl)thiouereido)propanoic acid] (MTP

In this work, prepared new ligand[3- (1H-indol-3-yl) -2- (3-(4- methoxybenzoyl)thiouereido) propanoic acid](MTP) has been synthesized by reaction of 4-Methoxybenzoyl isothiocyanate with tryptophane(1:1), The ligand was characterized by elemental microanalysis C.H.N.S, FT-IR, UV-Vis and 1H,13C NMR spectra, Some transition metals complexes of this ligand were prepared and characterized by FT-IR, UV-Vis spectra, conductivity measurements, magnetic susceptibility and atomic absorption, From obtained results the molecular formula of all prepared complexes were [M(MTP)2] (M+2 =Mn, Co, Ni, Cu, Zn, Cd and Hg), the proposed geometrical structure for all complexes were tetrahedral except copper complex has a square planer geometry around metallic ion

... Show More
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
Further properties of the fuzzy complete a-fuzzy normed algebra

    In this paper further properties of the fuzzy complete a-fuzzy normed algebra have been introduced. Then we found the relation between the maximal ideals of fuzzy complete a-fuzzy normed algebra and the associated multiplicative linear function space. In this direction we proved that if  is character on Z then ker is a maximal ideal in Z. After this we introduce the notion structure of the a-fuzzy normed algebra then we prove that the structure, st(Z) is -fuzzy closed subset of fb(Z, ) when  (Z,  , , ) is a commutative fuzzy complete a-fuzzy normed algebra with identity e.

Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Crossref (1)
Crossref
Publication Date
Sun Apr 01 2012
Journal Name
2012 International Conference On Future Communication Networks
Efficient method to find the multiplicative inverse in GF (2<sup>m</sup>) using FPGA by exponentiation to (2<sup>k</sup>)

Multiplicative inverse in GF (2 m ) is a complex step in some important application such as Elliptic Curve Cryptography (ECC) and other applications. It operates by multiplying and squaring operation depending on the number of bits (m) in the field GF (2 m ). In this paper, a fast method is suggested to find inversion in GF (2 m ) using FPGA by reducing the number of multiplication operations in the Fermat's Theorem and transferring the squaring into a fast method to find exponentiation to (2 k ). In the proposed algorithm, the multiplicative inverse in GF(2 m ) is achieved by number of multiplications depending on log 2 (m) and each exponentiation is operates in a single clock cycle by generating a reduction matrix for high power of two ex

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Thu Jul 01 2021
Journal Name
Iraqi Journal Of Science
Splitting of PG(1,27) by Sets, Orbits, and Arcs on the Conic

This research aims to give a splitting structure of the projective line over the finite field of order twenty-seven that can be found depending on the factors of the line order. Also, the line was partitioned by orbits using the companion matrix. Finally, we showed the number of projectively inequivalent -arcs on the conic  through the standard frame of the plane PG(1,27)

Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
3-D Seismic Interpretation of Hartha Formation at Nasiriyah Oil Field, South Iraq

This study deal with structural and stratigraphic analysis of the seismic reflection data for Hartha Formation at Nasiriyah field, the area of seismic data is about (1237) km2. Nasiriyah oil field is located in Dhi Qar Governorate, southern Iraq, and the oil field is located to the East of Euphrates River of about (38) km northwest of Nasiriyah city. which includes twenty-four (24) wells. In some wells there are oil evidences in Hartha Formation at Nasiriyah oil field, for this reason, Hartha Formation is studied.
Two reflectors are picked (top and bottom Hartha) they are defined by using synthetic seismograms in time domain for wells (Ns-1, and 3). Time and depth of Hartha Formation are drawn using velocity data of reflectors. The st

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 27 2017
Journal Name
Al-khwarizmi Engineering Journal
An Experimental Study of Capillary Tubes Behavior With R-12 and R-134a

 

Experimental work has been performed on three capillary tubes of different lengths and diameters using R-12 and R-134a. The test also studies the effect of discharge and speed of evaporator fan. The results clearly showed that refrigerant type and discharge significantly influence the temperature drop across the capillary tube. While the speed of evaporator fan has small effect. Experimental results showed that the temperature gradient for the two refrigerants are the same, but after approximatly one meter the temperature gradient of R-134a  is steeper than R-12.

 

View Publication Preview PDF
Publication Date
Sun Jul 02 2023
Journal Name
Iraqi Journal Of Science
A secure Search over Distributed Data

In recent years, due to the economic benefits and technical advances of cloud
computing, huge amounts of data have been outsourced in the cloud. To protect the
privacy of their sensitive data, data owners have to encrypt their data prior
outsourcing it to the untrusted cloud servers. To facilitate searching over encrypted
data, several approaches have been provided. However, the majority of these
approaches handle Boolean search but not ranked search; a widely accepted
technique in the current information retrieval (IR) systems to retrieve only the top–k
relevant files. In this paper, propose a distributed secure ranked search scheme over
the encrypted cloud servers. Such scheme allows for the authorized user to

... Show More
View Publication Preview PDF