Finding orthogonal matrices in different sizes is very complex and important because it can be used in different applications like image processing and communications (eg CDMA and OFDM). In this paper we introduce a new method to find orthogonal matrices by using tensor products between two or more orthogonal matrices of real and imaginary numbers with applying it in images and communication signals processing. The output matrices will be orthogonal matrices too and the processing by our new method is very easy compared to other classical methods those use basic proofs. The results are normal and acceptable in communication signals and images but it needs more research works.
Mixed ligand metal complexes of CrIII, FeIII,II, NiII and CuII have been synthesized using 5-chlorosalicylic acid (5-CSA) as a primary ligand and L-Valine (L-Val) as secondary ligand. The metal complexes have been characterized by elemental analysis, electrical conductance, magnetic susceptibility measurements and spectral studies. The electrical conductance studies of the complexes indicate their electrolytic nature. Magnetic susceptibility measurements revealed paramagnetic nature of the all complexes. Bonding of the metal ion through –OHand –COOgroups of bidentate to the 5-chlorosalicylic acid and through –NH2 and –COOgroups of bidentate to the L-valine by FT-IR studies . The agar diffusion method has been used to study the antib
... Show MoreThe research aims to determine the role of functional alienation and its impact on Job Satisfaction in General Motors Company, that were selected to apply the field side being an important company in Iraq, the problem was research with difficulty in employees adapt and their sense of alienation in their work which is reflected negatively on the level of satisfaction with work in company searched. A questionnaire was adopted as the main tool for data collection research which included (31) items distributed on (50) employees in the company selected, on a randomly chosen and based on the statistical program ready by (SPSS). Sample of this study was the most important findings of the research are the weak management of the company i
... Show MoreThe research aimed to measure the reality of monetary policy and its role in neutralizing the impact of fluctuations in total domestic oil prices, through the most important monetary policy variable (money supply). An example of this is using a simple technique in the previous example, turning it into a straightforward user interface by (Judd and Kunee). After estimating the impact of the policy with the domestic gross domestic oil prices in Iraq, the effect of fluctuations in the domestic gross domestic oil prices in the simple regression model, while the morale of oil prices was not proven with a negative sign, while the morale of money supply and their impact on the increase of the domestic was proven in the multiple regressio
... Show MoreThe mixed-spin ferrimagnetic Ising system consists of two-dimensional sublattices A and B with spin values and respectively .By used the mean-field approximation MFA of Ising model to find magnetism( ).In order to determined the best stabile magnetism , Gibbs free energy employ a variational method based on the Bogoliubov inequality .The ground-state (Phase diagram) structure of our system can easily be determined at , we find six phases with different spins values depend on the effect of a single-ion anisotropies .these lead to determined the second , first orders transition ,and the tricritical points as well as the compensation phenomenon .
The research aims to provide an integrated knowledge framework for the two basic research topics of (marketing deception, organizational reputation), their main dimensions, and framing the knowledge within them in a serious attempt to provide appropriate answers to the questions of the research problem by diagnosing the nature of the relationship between the components of marketing deception to identify the elements and how to activate it via reputable organizational components. The research was based on the analytical survey method. The research sample targeted (364) pharmacies within the capital Baghdad exclusively, the main tool of the research was the questionnaire, as well as the design of models prepared fo
... Show MoreEverybody is connected with social media like (Facebook, Twitter, LinkedIn, Instagram…etc.) that generate a large quantity of data and which traditional applications are inadequate to process. Social media are regarded as an important platform for sharing information, opinion, and knowledge of many subscribers. These basic media attribute Big data also to many issues, such as data collection, storage, moving, updating, reviewing, posting, scanning, visualization, Data protection, etc. To deal with all these problems, this is a need for an adequate system that not just prepares the details, but also provides meaningful analysis to take advantage of the difficult situations, relevant to business, proper decision, Health, social media, sc
... Show MoreThe seasonal behavior of the light curve for selected star SS UMI and EXDRA during outburst cycle is studied. This behavior describes maximum temperature of outburst in dwarf nova. The raw data has been mathematically modeled by fitting Gaussian function based on the full width of the half maximum and the maximum value of the Gaussian. The results of this modeling describe the value of temperature of the dwarf novae star system leading to identify the type of elements that each dwarf nova consisted of.
Traffic classification is referred to as the task of categorizing traffic flows into application-aware classes such as chats, streaming, VoIP, etc. Most systems of network traffic identification are based on features. These features may be static signatures, port numbers, statistical characteristics, and so on. Current methods of data flow classification are effective, they still lack new inventive approaches to meet the needs of vital points such as real-time traffic classification, low power consumption, ), Central Processing Unit (CPU) utilization, etc. Our novel Fast Deep Packet Header Inspection (FDPHI) traffic classification proposal employs 1 Dimension Convolution Neural Network (1D-CNN) to automatically learn more representational c
... Show MoreAttacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover. The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit
... Show More