Preferred Language
Articles
/
k4bMgYYBIXToZYALaow8
DETERMINATION OF THE GEOID HEIGHT (GEOID UNDULATION) BY USING MODERN SURVEYING TECHNOLOGIES
...Show More Authors

In this work, a large part of Baghdad University campus has been selected. The determination of Geoidal height for the local area requires Ground Control Points which both Ellipsoidal and Orthometric heights are known to compute the difference between them. The first step of the leveling process began by selected the Ground Control Points (GCPs) around the area of the work, and then divided them into two groups of the network traverse stations. They were leveled and adjusted depend on the number of the Bench Marks (B.M.s). Total Station TS (Nikon Nivo 5C) and Global Positioning System (GPS-Garmin 78 map) are used to do this application. The aim of the proposed work was to determine the height of the Geoid surface in the study area. The Geoidal height is calculated from the difference between the two different heights (Orthometric and Ellipsoidal) for the same point and using Geoid Model (EGM) method, then to compare between them. Maximum and the minimum values for the Geoid Undulation are (1.6261 m), and (1.5964 m) respectively with average (1.61 meter) by using (EGM 2008). When it is used the difference method (h-H), maximum and the minimum values for the Geoid Undulation are (5 m), and (2 m) respectively. Finally, the model EGM-2008 represents the best method to determine the Geoid Undulation. dN value between the two different methods is a maximum (3.40) m, a minimum (0.40 m), the average value (1.5 m), and a standard deviation (SD)= ±0.030. At last, image map was produced using Arc GIS 10.1.

Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Desalination And Water Treatment
Reducing endotoxin from dialysis water by using different disinfection processes
...Show More Authors

View Publication
Scopus (7)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Decisions making for fraction functions By Using Goal Programming Method
...Show More Authors

Decision making is vital and important activity in field operations research ,engineering ,administration science and economic science with any industrial or service company or organization because the core of management process as well as improve him performance . The research includes decision making process when the objective function is fraction function and solve models fraction programming by using some fraction programming methods and using goal programming method aid programming ( win QSB )and the results explain the effect use the goal programming method in decision making process when the objective function is
fraction .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Estimating Parametersof Gumbel Distribution For Maximum Values By using Simulation
...Show More Authors

In this research estimated the parameters of Gumbel distribution Type 1 for Maximum values through the use of two estimation methods:- Moments (MoM) and Modification Moments(MM) Method. the Simulation used for comparison between each of the estimation methods to reach the best method to estimate the parameters where the simulation was to generate random data follow Gumbel distributiondepending on three models of the real values of the parameters for different sample sizes with samples of replicate (R=500).The results of the assessment were put in tables prepared for the purpose of comparison, which made depending on the mean squares error (MSE).

View Publication Preview PDF
Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Thu Jan 07 2021
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Thyroid Carcinoma Patients Correlated With Cytomegalovirus by using Insitu Hybridization
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Journal Of The College Of Languages (jcl)
The adaptation and the different modifications of borrowed Arabic Plurals in Modern Turkish: Kökende Çoğul Olarak Kullanılan Arapça Kelimelerin Türkçe’ye Geçmesi ve Türkiye Türkçesinde Kullanım Şekilleri
...Show More Authors

In the tenth century, Turks began to convert into Islam and adopted for official and literary use the Arabic language to study the teachings of the new religion they believed in. The use of  many of the loanwords have become absolute in the Ottoman period, but even in Modern Turkish a large number of loanwords from Arabic can be often recognized because they are not subject to the strict rules of Turkish. Yet, some of these words lost its original meaning and acquired new different Turkish meaning. Moreover, some of the Arabic nouns of singular form in Turkish, modified the plural Turkish form. The present study entitled “the adaptation and the different modifications of borrowed Arabic Plurals in Modern Turkish” sheds light on

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
The semantic and stylistic characteristics of historicism (marked vocabulary) In the modern russian literary language: Семантико-стилистическая характеристика Историзмов (маркированной лексики) В современном русском литературном языке
...Show More Authors

The article considers semantic and stylistic motivations for using obsolete lexicon (historicisms) in the text of a work of art. The specifics of the functioning of this process are presented against the background of the features of the contemporary Russian literary language. Attention is focused on the fact that the layer of obsolete lexical units belongs to a number of nationally specific vocabulary, the development of which forms an understanding of the nature of the actualized language. In addition, it should be noted that the semantics of historicisms is culturally commensurate: the latter is explained by the fact that the deactuation of linguistic units is positioned as parallel to the sociocultural and political changes.

... Show More
View Publication Preview PDF
Crossref