Preferred Language
Articles
/
6RcQXI8BVTCNdQwCSG1W
A NOTE ON STRONGLY FULLY STABLE BANACH ALGEBRA MODULES RELATIVE TO AN IDEAL
...Show More Authors

Let A be a unital algebra, a Banach algebra module M is strongly fully stable Banach A-module relative to ideal K of A, if for every submodule N of M and for each multiplier θ : N → M such that θ(N) ⊆ N ∩ KM. In this paper, we adopt the concept of strongly fully stable Banach Algebra modules relative to an ideal which generalizes that of fully stable Banach Algebra modules and we study the properties and characterizations of strongly fully stable Banach A-module relative to ideal K of A.

Scopus
Publication Date
Fri Jan 13 2023
Journal Name
Atmosphere
Impact of North African Sand and Dust Storms on the Middle East Using Iraq as an Example: Causes, Sources, and Mitigation
...Show More Authors

This study aims to determine the reasons for the increase in the frequency of sand and dust storms in the Middle East and to identify their sources and mitigate them. A set of climatic data from 60 years (1960–2022) was analyzed. Sand storms in Iraq are a silty sand mature arkose composed of 72.7% sand, 25.1% silt, and 2.19% clay; the clay fraction in dust storms constitutes 70%, with a small amount of silt (20.6%) and sand (9.4%). Dust and sand storms (%) are composed of quartz (49.2, 67.1), feldspar (4.9, 20.9), calcite (38, 5), gypsum (4.8, 0.4), dolomite (0.8, 1.0), and heavy minerals (3.2, 6.6). Increasing temperatures in Iraq, by an average of 2 °C for sixty years, have contributed to an increase in the number of dust storm

... Show More
View Publication Preview PDF
Crossref (50)
Crossref
Publication Date
Mon Mar 27 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Experimental study of natural convection heat transfer on an enclosure partially filled porous medium heated from below by constant heat flux
...Show More Authors

This study reports on natural convection heat transfer in a square enclosure of length (L=20 cm) with a saturated porous medium (solid glass beads) having same fluid (air) at lower horizontal layer and free air fill in the rest of the cavity's space. The experimental work has been performed under the effects of heating from bottom by constant heat flux q=150,300,450,600 W/m2 for four porous layers thickness Hp (2.5,5,7.5,1) cm and three heaters length δ(20,14,7) cm. The top enclosure wall was good insulated and the two side walls were symmetrically cooled at constant temperature. Four layers of porous media with small porosity, Rayleigh number range (60.354 - 241.41) and (Da) 3.025x10-8 has been investigated. The obtained data of temperatu

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Mon Aug 05 2024
Journal Name
Food And Bioprocess Technology
Development of an Innovative Reinforced Food Packaging Film Based on Corn Starch/Hydroxypropyl Methylcellulose/Nanocrystalline Cellulose Incorporated with Nanogel Containing Quercetin
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Pharmaceutical Sciences Asia
Effect of sub-minimum inhibitory concentrations of ceftriaxone on the Pseudomonas aeruginosa adhesion to human oral mucosal epithelial cells and biofilm formation to polystyrene in vitro
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
A Review on Induced Electro-Fenton Process for Wastewater Treatment
...Show More Authors
Abstract<p>Induced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H<sub>2</sub>O<sub>2</sub> concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (48)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Chemical Sensor Based on a Hollow-Core Photonic Crystal Fiber
...Show More Authors

In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.

View Publication Preview PDF
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A New Cipher Based on Feistel Structure and Chaotic Maps
...Show More Authors

Chaotic systems have been proved to be useful and effective for cryptography. Through this work, a new Feistel cipher depend upon chaos systems and Feistel network structure with dynamic secret key size according to the message size have been proposed. Compared with the classical traditional ciphers like Feistel-based structure ciphers, Data Encryption Standards (DES), is the common example of Feistel-based ciphers, the process of confusion and diffusion, will contains the dynamical permutation choice boxes, dynamical substitution choice boxes, which will be generated once and hence, considered static,

            While using chaotic maps, in the suggested system, called

... Show More
View Publication Preview PDF
Scopus (22)
Crossref (4)
Scopus Clarivate Crossref