Preferred Language
Articles
/
Cxc0Vo4BVTCNdQwCzUPp
Distinguishing Gasoline Engine Oils of Different Viscosities Using Terahertz Time-Domain Spectroscopy
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Lecture Notes In Mechanical Engineering
Development and Validation of a Free Piston Engine Linear Generator Simulation Model Including Cycle-To-Cycle Variation and Ignition Timing Sub-Models
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Dec 21 2020
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
MONITORING OF THE WILD MAMMAL FAUNA IN BAMO MOUNTAIN IN NORTHERN IRAQ (KURDISTAN) FOR THE FIRST TIME USING CAMERA TRAP METHOD AND RAISING AWARENESS FOR ITS CONSERVATION
...Show More Authors

Mammals are under threat worldwide due to deforestation, hunting, and other human activities. In Iraq, a total of 93 species of wild mammals have been recorded including species with global conservation concern. Bamo Mountain is situated within the Zagros Mountains in northern Iraq which is a suitable habitat for wild mammals. Due to scarcity of the field survey efforts and cryptic behavior, monitoring of the wild mammals fauna in Zagros Mountain seems challenging. Therefore, we used a camera trap which seems to be an ideal way to determine species diversity of wild mammals in Bamo Mountain. Moreover, interviews with local villagers were performed. The mammalian diversity of Bamo Mountain is not fully explored but seemed threatened by lo

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Determination of time-dependent coefficient in inverse coefficient problem of fractional wave equation
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jul 01 2003
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
RECORDING OF FIVE MONOGENETIC TREMATODES FOR THE FIRST TIME FROM FISHES OF IRAQ
...Show More Authors

A total of 589 fishes, belonging to 23 species were collected from eight different localities
in north and mid Iraq during 1993. The parasitological inspection of such fishes revealed the
presence of 59 parasite species and two fungi. Among such parasites, five monogenetic
trematodes were recorded on the gills of some fishes for the first time in Iraq. These
included:- Ancyrocephalus vanbenedenii on Liza abu from Tigris river at Al-Zaafaraniya,
south of Baghdad; Dactylogyrus anchoratus on Cyprinus carpio from Tigris river at Al –
Zaafaranya D. minutus on C. carpio from both Tigris river at Al-Zaafaraniya and Euphrates
river at Al-Qadisiya dam lake; Discocotyle sagittata on L. abu from both the drainage system
at

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
Prediction Unconfined Compressive Strength for Different Lithology Using Various Wireline Type and Core Data for Southern Iraqi Field
...Show More Authors

Unconfined Compressive Strength is considered the most important parameter of rock strength properties affecting the rock failure criteria.  Various research have developed rock strength for specific lithology to estimate high-accuracy value without a core.  Previous analyses did not account for the formation's numerous lithologies and interbedded layers. The main aim of the present study is to select the suitable correlation to predict the UCS for hole depth of formation without separating the lithology. Furthermore, the second aim is to detect an adequate input parameter among set wireline to determine the UCS by using data of three wells along ten formations (Tanuma, Khasib, Mishrif, Rumaila, Ahmady, Maudud, Nahr Um

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Remote Patient Healthcare surveillance system based real-time vital signs
...Show More Authors

Today many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of  ECG signal such as Q,R,S, and T waves.  The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Using the Critical Path Method (CPM) for scheduling the project (paving the Amil Sayid Al-Ayyam Street with a length of 1.25 km) In terms of Decresing the time
...Show More Authors

The implementation of the concept of project scheduling in the organizations generally requires a set of procedures and requirements, So, most important of all is the understanding and knowledge of the tools and techniques which are called the methods of scheduling projects. Consequently, the projects of the municipality administration in the holy governorate of Karbala suffer from the problem of delaying their projects and chaos in the ways of implementation. To provide assistance to this directorate and to demonstrate how to schedule projects using one of the advanced scientific methods that proved their ability to schedule any project and its potential to accelerate the time of completion, as well as ease of use and effectiven

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Mar 21 2024
Journal Name
International Development Planning Review
THE EFFECT OF USING A DISABLING FORCE TRAINING TOOL ON WALKING PERFORMANCE: AN ANALYTICAL STUDY OF TIME AND STEP LENGTH IN THE 20 KM WALKING RACE EVENT FOR APPLICANTS
...Show More Authors