Preferred Language
Articles
/
3hcGMI8BVTCNdQwC3V4N
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Journal Of Electronic Materials
Influence of Dry and Wet Etching on AlInSb Contact Resistivity, Transfer Length, and Sheet Resistance Using Circular Transmission Model
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sun Jan 13 2019
Journal Name
Iraqi Journal Of Physics
Shell model and Hartree-Fock calculations of electron scattering form factors for 25Mg nucleus
...Show More Authors

Shell model and Hartree-Fock calculations have been adopted to study the elastic and inelastic electron scattering form factors for 25Mg nucleus. The wave functions for this nucleus have been utilized from the shell model using USDA two-body effective interaction for this nucleus with the sd shell model space. On the other hand, the SkXcsb Skyrme parameterization has been used within the Hartree-Fock method to get the single-particle potential which is used to calculate the single-particle matrix elements. The calculated form factors have been compared with available experimental data.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Intelligent Decision Technologies
Safety assessment model for DoS attacks detection in wireless communication and network OS environments
...Show More Authors

Wireless networks and communications have witnessed tremendous development and growth in recent periods and up until now, as there is a group of diverse networks such as the well-known wireless communication networks and others that are not linked to an infrastructure such as telephone networks, sensors and wireless networks, especially in important applications that work to send and receive important data and information in relatively unsafe environments, cybersecurity technologies pose an important challenge in protecting unsafe networks in terms of their impact on reducing crime. Detecting hacking in electronic networks and penetration testing. Therefore, these environments must be monitored and protected from hacking and malicio

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
Simulation Model for the Assessment of Direct and Indirect Georeferencing Techniques in Analytical Photogrammetry
...Show More Authors

B Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2

View Publication
Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
SIMULATION MODEL FOR THE ASSESSMENT OF DIRECT AND INDIRECT GEOREFERENCING TECHNIQUES IN ANALYTICAL PHOTOGRAMMETRY
...Show More Authors

This paper compares between the direct and indirect georeferencing techniques in Photogrammetry bases on a simulation model. A flight plan is designed which consists of three strips with nine overlapped images for each strip by a (Canon 500D) digital camera with a resolution of 15 Mega Pixels.

 

The triangulation computations are carried out by using (ERDAS LPS) software, and the direct measurements are taken directly on the simulated model to substitute using GPS/INS in real case. Two computational tests have been implemented to evaluate the positional accuracy for the whole model and the Root Mean Square Error (RMSE) relating to (30) check points show that th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Aug 22 2019
Journal Name
Separation Science And Technology
Modification of Langmuir model for simulating initial pH and temperature effects on sorption process
...Show More Authors

Scopus (45)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Fri Aug 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Using Bayesian method to estimate the parameters of Exponential Growth Model with Autocorrelation problem and different values of parameter of correlation-using simulation
...Show More Authors

We have studied Bayesian method in this paper by using the modified exponential growth model, where this model is more using to represent the growth phenomena. We focus on three of prior functions (Informative, Natural Conjugate, and the function that depends on previous experiments) to use it in the Bayesian method. Where almost of observations for the growth phenomena are depended on one another, which in turn leads to a correlation between those observations, which calls to treat such this problem, called Autocorrelation, and to verified this has been used Bayesian method.

The goal of this study is to knowledge the effect of Autocorrelation on the estimation by using Bayesian method. F

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Journal Of Engineering
Optimization and Modeling the Performance of a Mediator-less Microbial Fuel Cell using Butler-Volmer-Monod Model
...Show More Authors

In this study, a one-dimensional model represented by Butler-Volmer-Monod (BVM) model was proposed to compute the anode overpotential and current density in a mediator-less MFC system. The system was fueled with various organic loadings of real field petroleum refinery oily sludge to optimize the favorable organic loading for biomass to operate the suggested system. The increase in each organic loading showed higher resistance to electrons transport to the anode represented by ohmic loss. On the contrary, both activation and mass transfer losses exhibited a noticeable decrement upon the increased organic loadings. However, current density was improved throughout all increased loads achieving a maximum current density of 5.2 A/m3

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Study of the matter density distributions of halo nuclei 6He and 16C using the binary cluster model
...Show More Authors

The harmonic oscillator (HO) and Gaussian (GS) wave functions within the binary cluster model (BCM) have been employ to investigate the ground state neutron, proton and matter densities as well as the elastic form factors of two- neutron 6He and 16C halo nuclei. The long tail is a property that is clearly revealed in the density of the neutrons since it is found in halo orbits. The existence of a long tail in the neutron density distributions of 6He and 16C indicating that these nuclei have a neutron halo structure. Moreover, the matter rms radii and the reaction cross section (𝜎𝑅 ) of these nuclei have been calculated using the Glauber model.

View Publication
Publication Date
Thu Jun 01 2017
Journal Name
American Journal Of Pharmaceutical Education
Exploring Electronic Communication Modes Between Iraqi Faculty and Students of Pharmacy Schools Using the Technology Acceptance Model
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref