In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum method and Modified 2D-Checksum. In 2D-checksum method, summing process was done for 7×7 patterns in row direction and then in column direction to result 8×8 patterns. While in modified method, an additional parity diagonal vector was added to the pattern to be 8×9. By combining the benefits of using single parity (detecting odd number of error bits) and the benefits of checksum (reducing the effect of 4-bit errors) and combining them in 2D shape, the detection process was improved. By contaminating any sample of data with up to 33% of noise (change 0 to 1 and vice versa), the detecting process in first method was improved by approximately 50% compared to the ordinary traditional two dimensional-parity method and gives best detection results in second novel method
In this paper, the effect of changes in bank deposits on the money supply in Iraq was studied by estimating the error correction model (ECM) for monthly time series data for the period (2010-2015) . The Philips Perron was used to test the stationarity and also we used Engle and Granger to test the cointegration . we used cubic spline and local polynomial estimator to estimate regression function .The result show that local polynomial was better than cubic spline with the first level of cointegration.
SMNs like Facebook, YouTube, Twitter, WhatsApp,..etc. are among the most popular sites on the Internet. These sites can provide a powerful means of sharing, organizing, finding information and knowledge. The popularity of these sites provides an opportunity to measure the use them in knowledge sharing, which needs a special scale, but unfortunately, there is no special scale for that. Thus, this study supposes to use SCT as a scale to measure the use of SMNs in electronic knowledge sharing due to it has been used to measure knowledge sharing with its traditional form. This study can help the decision-makers to use these SMNs to share the academics’ knowledge in educational institutes to the communi
... Show MoreFirst: The entrance to media and democracy
The growth of the media and the development of its technologies are linked to the development of the democratic system and its political and mass institutions. In many cases, the technologies concerned were able to open the closed doors to the spread of democracy and broaden the base of its applications. As Dupre points out, “audio-visual has opened the image and sound after printing has opened the natural language” (1) to democratization. The generalization of the book, due to the development of printing, led to the transcendence of the Church's dominance in Europe, and the direct broadcasting and transmission of information enabled the media to transcend the domination of factional syst
The problem of this paper is identified by knowing the role of the economic television media in shaping the audience's attitudes. It seeks to understand the type of relationship between the dependence of the economic elite audience on news bulletins and its cognitive implications. The categories of Iraqi society, namely, the economic elite category. This paper adopted the descriptive survey method for the period from 3/1/2022 - 6/31/2022. The sample was extracted according to the relative stratified sampling method in the city of Baghdad. A set of results has been concluded, the most prominent of which is the public's heavy reliance on economic news bulletins to obtain news and information, as indicated by (63%) of the respondents partic
... Show MoreAbstract
The removal of water turbidity by using crumb rubber filter was investigated .The present study was conducted to evaluate the effect of variation of influent water turbidity (10, 25 and 50 NTU), media size (0.6and 1.14mm), filtration rate (25, 45 and 65 l/hr) and bed depth (30 and 60 cm) on the performance of mono crumb rubber filter in response to the effluent filtered water turbidity and head loss development, and compare it with that of conventional sand filter.Results revealed that 25 l/hr flow rate and 25 NTU influent turbidity were the best operating conditions. smaller media size and higher bed depth gave the best removal efficiency while higher media size and small bed depth gave lower head
... Show MoreThis study examines the removal of ciprofloxacin in an aqueous solution using green tea silver nanoparticles (Ag-NPs). The synthesized Ag-NPs have been classified by the different techniques of SEM, AFM, BET, FTIR, and Zeta potential. Spherical nanoparticles with average sizes of 32 nm and a surface area of 1.2387m2/g are found to be silver nanoparticles. The results showed that the ciprofloxacin removal efficiency depends on the initial pH (2.5-10), CIP (2-15 mg/L), temperature (20-50°C), time (0-180 min), and Ag-NPs dosage (0.1-1g/L). Batch experiments revealed that the removal rate with ratio (1:1) (w/w) were 52%, and 79.8% of the 10 mg/L of CIP at 60, and 180 minutes, respectively with optimal pH=4. Kinetic models for adsorpti
... Show MoreIn this research, we find the Bayesian formulas and the estimation of Bayesian expectation for product system of Atlas Company. The units of the system have been examined by helping the technical staff at the company and by providing a real data the company which manufacturer the system. This real data include the failed units for each drawn sample, which represents the total number of the manufacturer units by the company system. We calculate the range for each estimator by using the Maximum Likelihood estimator. We obtain that the expectation-Bayesian estimation is better than the Bayesian estimator of the different partially samples which were drawn from the product system after it checked by the
... Show MoreCloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreThe achievements of the art that we know today are questioned in motives that differ from what art knew before, including dramatic artistic transformations, which he called modern art.
In view of the enormity of such a topic, its ramifications and its complexity, it was necessary to confine its subject to the origin of the motives of the transformations of its first pioneers, and then to stand on what resulted from that of the data of vision in composition and drawing exclusively, and through exploration in that, we got to know the vitality of change from the art of its time.
And by examining the ruling contemporary philosophical concepts and their new standards and their epistemological role in contemporary life, since they includ