Preferred Language
Articles
/
6RdqUpEBVTCNdQwCZ5Te
Enhancement of security for free space optics based on reconfigurable chaotic technique
...Show More Authors

Free Space Optical (FSO) technology offers highly directional, high bandwidth communication channels. This technology can provide fiber-like data rate over short distances. In order to improve security associated with data transmission in FSO networks, a secure communication method based on chaotic technique is presented. In this paper, we have turned our focus on a specific class of piece wise linear one-dimensional chaotic maps. Simulation results indicate that this approach has the advantage of possessing excellent correlation property. In this paper we examine the security vulnerabilities of single FSO links and propose a solution to this problem by implementing the chaotic signal generator “reconfigurable tent map”. As synchronization between transmitter and receiver is essential for the correct operation of such schemes, we have also attempted to determine parameters such as auto- and cross …

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
The Ocular Surface
Detecting dry eye from ocular surface videos based on deep learning
...Show More Authors

View Publication
Scopus (14)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Image encryption algorithm based on the density and 6D logistic map
...Show More Authors

One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera

... Show More
View Publication
Scopus (22)
Crossref (10)
Scopus Crossref
Publication Date
Mon Oct 31 2022
Journal Name
Ingénierie Des Systèmes D Information
Iraqi Paradigm E-Voting System Based on Hyperledger Fabric Blockchain Platform
...Show More Authors

Voting is one of the most fundamental components of a democratic society. In 2021 Iraq held the Council of Representatives (CoR) elections in 83 electoral constituencies in 19 governorates. Nonetheless, several significant issues arose during this election, including the problem of logistics distribution, the excessively long period of ballot counting, voters can't know if their votes were counted or if their ballots were tampered with, and the inconsistent regulation of vote counting. Blockchain technology, which was just invented, may offer a solution to these problems. This paper introduces an electronic voting system for the Iraq Council of Representatives elections that is based on a prototype of the permission hyperledger fabr

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Preparation and characterization of mawsonite Cu6Fe2SnS8 [CFTS] thin films via the semi-computerized spray pyrolysis technique for photovoltaic applications
...Show More Authors

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Egyptian Journal Of Chemistry
Solvent-free synthesis of new chalcone derivatives from 3-nitro phthalic acid and evaluation of their biological activities
...Show More Authors

A theoretical and protection study was conducted of the corrosion behavior of carbon steel surface with different concentrations of the derivative (Quinolin-2-one), namly (1-Amino-4,7-dimethyl-6-nitro-1H-quinolin-2-one (ADNQ2O)). Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G (2d, 2p) level was used to calculate the optimized geometry, physical properties and chemical inhibition parameters, with the local reactivity to predict both the reactive centers and to locate the possible sites of nucleophilic and electrophilic attacks, in vacuum, and in two solvents (DMSO and H2O), all at the equilibrium geometry. Experimentally, the inhibition efficiencies (%IE) in the saline solution (of 3.5%) NaCl were studied using potentiomet

... Show More
View Publication
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Egyptian Journal Of Chemistry
Solvent-free synthesis of new chalcone derivatives from 3-nitro phthalic acid and evaluation of their biological activities
...Show More Authors

Synthesis of 2-(4-Acetyl-phenyl)-4-nitro-isoindole-1, 3-dione chalcones were performed by fusion of 3-nitro phthalic anhydride with p-aminoacetophenone. Then the later was grinded with different aromatic aldehydes in the presence of sodium hydroxide to produce new chalcones derivatives A3-10 without using any solvent formation of new N- arylphthailimide chalcones were confirmed by FT-IR,1HNMR, 13CNMR spectroscopy and all final compounds were tested for their antifungal and antibacterial activity some of them showed more biological activity than the standard drugs

Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Milk Tumor Necrosis Factor Alpha and Interleukin-1Beta Among Toxoplasma gondii-Free and Infected Women
...Show More Authors

Pro-inflammatory cytokines play an important role in intercellular communications. In the last two decades, many cytokines have been identified in human milk. These cytokines are variable according to different conditions such as pathogenic infections which strongly stimulated the immune response. The present study aims to determine of IL1β and TNF-α in Toxoplasma gondii-free and infected women in an attempt to clarify the impacts of the infections on cytokines especially in mother's milk. The serum and milk sample were collected from 96 samples (48 for seropositive and 48 for seronegative). To confirm the Toxoplasma gondii infection; enzyme linked immunofluorescence assay (ELIFA) was used to detect anti-Toxoplasma Ig

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Ammonia Removal in Free-Surface Constructed Wetlands Employing Synthetic Floating Islands: Employing synthetic floating islands
...Show More Authors

Free water surface constructed wetlands (FSCWs) can be used to complement conventional waste water treatment but removal efficiencies are often limited by a high ratio of water volume to biofilm surface area (i.e. high water depth). Floating treatment wetlands (FTWs) consist of floating matrices which can enhance the surface area available for the development of fixed microbial biofilms and provide a platform for plant growth (which can remove pollutants by uptake).  In this study the potential of FTWs for ammoniacal nitrogen (AN) removal was evaluated using experimental mesocosms operated under steady-state flow conditions with ten different treatments (two water depths, two levels of FTW mat coverage, two different plant densities and

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Jun 15 2024
Journal Name
Iraqi Journal Of Laser
Estimation of mean photon number based on single photon detection of weak coherent pulses
...Show More Authors

The demand for single photon sources in quantum key distribution (QKD) systems has necessitated the use of weak coherent pulses (WCPs) characterized by a Poissonian distribution. Ensuring security against eavesdropping attacks requires keeping the mean photon number (µ) small and known to legitimate partners. However, accurately determining µ poses challenges due to discrepancies between theoretical calculations and practical implementation. This paper introduces two experiments. The first experiment involves theoretical calculations of µ using several filters to generate the WCPs. The second experiment utilizes a variable attenuator to generate the WCPs, and the value of µ was estimated from the photons detected by the BB

... Show More
View Publication Preview PDF
Crossref