The group for the multiplication of closets is the set G|N of all closets of N in G, if G is a group and N is a normal subgroup of G. The term “G by N factor group” describes this set. In the quotient group G|N, N is the identity element. In this paper, we procure K(SL(2,125)) and K(SL(2,3125)) from the character table of rational representations for each group.
The effectiveness of (200 m) of the events of extreme intensity and this is characterized by training in the anaerobic energy system prevailing in the result of this privacy as these are based on the physical abilities and functional indicators identified in this direction and hence the importance of research in the evaluation of training programs on the basis of physical abilities and some indicators of the functionality of the hostile 200 m . The study aimed to: 1. Evaluation of training programs according to physical abilities and some functional indicators of hostile men.The researchers used the descriptive analytical method to suit the nature of the research. The researchers selected them research sample by the deliberate method of the
... Show MoreThe current study focuses on utilizing artificial intelligence (AI) techniques to identify the optimal locations of production wells and types for achieving the production company’s primary objective, which is to increase oil production from the Sa’di carbonate reservoir of the Halfaya oil field in southeast Iraq, with the determination of the optimal scenario of various designs for production wells, which include vertical, horizontal, multi-horizontal, and fishbone lateral wells, for all reservoir production layers. Artificial neural network tool was used to identify the optimal locations for obtaining the highest production from the reservoir layers and the optimal well type. Fo
Encryption of data is translating data to another shape or symbol which enables people only with an access to the secret key or a password that can read it. The data which are encrypted are generally referred to as cipher text, while data which are unencrypted are known plain text. Entropy can be used as a measure which gives the number of bits that are needed for coding the data of an image. As the values of pixel within an image are dispensed through further gray-levels, the entropy increases. The aim of this research is to compare between CAST-128 with proposed adaptive key and RSA encryption methods for video frames to determine the more accurate method with highest entropy. The first method is achieved by applying the "CAST-128" and
... Show MoreIn the presence of deep submicron noise, providing reliable and energy‐efficient network on‐chip operation is becoming a challenging objective. In this study, the authors propose a hybrid automatic repeat request (HARQ)‐based coding scheme that simultaneously reduces the crosstalk induced bus delay and provides multi‐bit error protection while achieving high‐energy savings. This is achieved by calculating two‐dimensional parities and duplicating all the bits, which provide single error correction and six errors detection. The error correction reduces the performance degradation caused by retransmissions, which when combined with voltage swing reduction, due to its high error detection, high‐energy savings are achieved. The res
... Show MoreThis paper introduces a complete design and simulation of a controller for the double fed induction generator (DFIG) turbine. The work also included the solar updraft tower (SUT) design to supply Al-Mahmoudia hospital in Baghdad/Iraq. The design includes the daily average load estimation, annual solar irradiance and, temperature monitoring, and logging.
According to the data obtained from the Ministry of Science and Technology, Baghdad has low wind speed. Therefore, the (SUT) has been designed to generate electrical power depending on the difference between the external and internal air temperature. The temperature difference will generate a suitable airspeed to drive the wind turbine, connected to the proposed (DFIG) generators
... Show MoreIn this article, new Schiff base ligand LH-prepared Mn(II), Co(II), Ni(II), Cu(II), Zn(II), Cd(II), Hg(II), Pd(II), and Pt(II) materials were analyzed using spectroscopy (1 Metal: 2 LH). The ligand was identified using techniques such as FTIR, UV-vis, 1H-13C-NMR, and mass spectra, and their complexes were identified using CHN microanalysis, UV-vis and FTIR spectral studies, atomic absorption, chloride content, molar conductivity measurements, and magnetic susceptibility. According to the measurements, the ligand was bound to the divalent metal ions as a bidentate through oxygen and nitrogen atoms. The complexes that were created had microbicide activity against two different bacterial species and one type of fungus. DPPH techniques were bei
... Show MoreA new nano-sized NiMo/TiO2-γ-Al2O3 was prepared as a Hydrodesulphurization catalyst for Iraqi gas oil with sulfur content of 8980 ppm, supplied from Al-Dura Refinery. Sol-gel method was used to prepare TiO2- γ-Al2O3 nano catalyst support with 64% TiO2, 32% Al2O3, Ni-Mo/TiO-γ-Al2O3 catalyst was prepared under vacuum impregnation conditions to loading metals with percentage 3.8 wt.% and 14 wt.% for nickel and molybdenum respectively while the percentage for alumina, and titanium became 21.7, and 58.61 respectively. The synthesized TiO2- γ-Al2O3 nanocomposites and Ni-Mo /TiO2
... Show More