Preferred Language
Articles
/
8xc9kJMBVTCNdQwCe9Vv
A UWB Monopole Antenna Design based RF Energy Harvesting Technology
...Show More Authors

Recently, wireless charging based RF harvesting has interfered our lives [1] significantly through the different applications including biomedical, military, IoT, RF energy harvesting, IT-care, and RFID technologies. Wirelessly powered low energy devices become significantly essential for a wide spectrum of sensing applications [1]. Such devices require for low energy resources from sunlight, mechanical vibration, thermal gradients, convection flows or other forms of harvestable energy [2]. One of the emerging power extraction resources based on passive devices is harvesting radio frequency (RF) signals powers [3]–[5]. Such applications need devices that can be organized in very large numbers, so, making separate node battery impractical. RF powered devices including sensor nods can be used potentially in ultra-low-power areas to extend the life battery span [4]. Moreover, modern biomedical implantable devices require power source channels for charging to prolong the lifetime of the implanted device and reduce the chances of battery replacements [5]. Furthermore, the ambient electromagnetic energy recycling possibility in dense urban zones population was significantly explored in [6]. Therefore, power conversion circuits to extract enough DC power from the incident electromagnetic waves for passive devices become urgent demand [7]. RF energy harvesters, generally, are consistent with an antenna, a power management circuit, and a rectifier [3]. The antenna part is the responsible element for collecting the RF energy from radiating sources. The appropriate antenna design is the one with a wide bandwidth of omnidirectional radiation patterns to collect the energy from a different direction at any frequency [8].

Scopus Crossref
View Publication
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Cogent Engineering
Content-based image retrieval: A review of recent trends
...Show More Authors

View Publication
Scopus (118)
Crossref (107)
Scopus Clarivate Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
A Systematic Review of Brain-Computer Interface Based EEG
...Show More Authors

The futuristic age requires progress in handwork or even sub-machine dependency and Brain-Computer Interface (BCI) provides the necessary BCI procession. As the article suggests, it is a pathway between the signals created by a human brain thinking and the computer, which can translate the signal transmitted into action. BCI-processed brain activity is typically measured using EEG. Throughout this article, further intend to provide an available and up-to-date review of EEG-based BCI, concentrating on its technical aspects. In specific, we present several essential neuroscience backgrounds that describe well how to build an EEG-based BCI, including evaluating which signal processing, software, and hardware techniques to use. Individu

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Yearly Energy, Exergy, and Environmental (3E) Analyses of A Photovoltaic Thermal Module and Solar Thermal Collector in Series
...Show More Authors

The annual performance of a hybrid system of a flat plate photovoltaic thermal system and a solar thermal collector (PVT/ST) is numerically analyzed from the energy, exergy, and environmental (CO2 reduction) viewpoints. This system can produce electricity and thermal power simultaneously, with higher thermal power and exergy compared to conventional photovoltaic thermal systems. For this purpose, a 3D transient numerical model is developed for investigating the system's performance in four main steps: (1) investigating the effects of the mass flow rate of the working fluid (20 to 50 kg/h) on the temperature behavior and thermodynamic performance of the system, (2) studying the impacts of using glass covers on the different parts of the s

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Energy Procedia
Studying The Effect of The Type of Substrate on The Structural, Morphology and Optical Properties of TiO2 Thin Films Prepared by RF Magnetron Sputtering
...Show More Authors

View Publication
Crossref (13)
Crossref
Publication Date
Wed Aug 28 2019
Journal Name
Journal Of Engineering
Treatment of Simulated Carwash Wastewater by Electrocoagulation with Sonic Energy
...Show More Authors

Oily carwash wastewater is a high organic and chemical wastewater. This paper targeted to investigate a treatment to decrease the water consumption and contaminants in car-washing stations. Electrocoagulation combined with ultrasonic energy (Sono-Electrocoagulation) was suggested so that the carwash wastewater is treated to be reused. The effect of both the voltage and time of treatment on the removal of COD, turbidity, conductivity, and total dissolved solids (TDS) were studied at constant initial pH 7 and electrode distance 2 cm. The results showed the best results of removal COD, turbidity, TDS, and reduce electrical conductivity is when the voltage was 30 V and a treatment time of 90 minutes.

  <

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref