Preferred Language
Articles
/
FRcsT48BVTCNdQwCZms5
Influence of Dry and Wet Etching on AlInSb Contact Resistivity, Transfer Length, and Sheet Resistance Using Circular Transmission Model
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 02 2014
Journal Name
Baghdad Science Journal
On Solving Hyperbolic Trajectory Using New Predictor-Corrector Quadrature Algorithms
...Show More Authors

In this Paper, we proposed two new predictor corrector methods for solving Kepler's equation in hyperbolic case using quadrature formula which plays an important and significant rule in the evaluation of the integrals. The two procedures are developed that, in two or three iterations, solve the hyperbolic orbit equation in a very efficient manner, and to an accuracy that proves to be always better than 10-15. The solution is examined with and with grid size , using the first guesses hyperbolic eccentric anomaly is and , where is the eccentricity and is the hyperbolic mean anomaly.

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Parametric Study on Unconnected Piled Raft Foundation Using Numerical Modelling
...Show More Authors

Piled raft is commonly used as foundation for high rise buildings. The design concept of piled raft foundation is to minimize the number of piles, and to utilize the entire bearing capacity. High axial stresses are therefore, concentrated at the region of connection between the piles and raft. Recently, an alternative technique is proposed to disconnect the piles from the raft in a so called unconnected piled raft (UCPR) foundation, in which a compacted soil layer (cushion) beneath the raft, is usually introduced.  The piles of the new system are considered as reinforcement members for the subsoil rather than as structural members. In the current study, the behavior of unconnected piled rafts systems has been studie

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sat Mar 31 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Static Model of Zubair Reservoir in Luhais Oil Field
...Show More Authors

Static reservoir modeling is the interacting and analysis of the geological data to visualize the reservoir framework by three-dimensional model and distribute the static reservoir properties. The Petrel E&P software used to incorporate the data. The interpreted log data and core report used in distribution of petrophysical properties of porosity, water saturation and permeability for Zubair reservoir in Luhais oil field.

   The reservoir discretized to 274968 cells in increments of 300, 200 and 1 meter in the direction of X, Y, and Z respectively. The geostatistical approach used in the distribution of the properties of porosity and water saturation overall the reservoir units. The permeability has been calculated

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Dynamics of Predator-prey Model under Fluctuation Rescue Effect
...Show More Authors

This paper presents a novel idea as it investigates the rescue effect of the prey with fluctuation effect for the first time to propose a modified predator-prey model that forms a non-autonomous model. However, the approximation method is utilized to convert the non-autonomous model to an autonomous one by simplifying the mathematical analysis and following the dynamical behaviors. Some theoretical properties of the proposed autonomous model like the boundedness, stability, and Kolmogorov conditions are studied. This paper's analytical results demonstrate that the dynamic behaviors are globally stable and that the rescue effect improves the likelihood of coexistence compared to when there is no rescue impact. Furthermore, numerical simul

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Non-Isothermal Crystallization Kinetics Model of PBT/ MWCNTs Nanocomposites
...Show More Authors

The non-isothermal crystallization kinetics and crystalline properties of nanocomposites poly butyleneterephthalate, [PBT] /multiwalled-carbon nanotubes (MWCNTs) were tested by differential scanning calorimetry (DSC). PBT/(MWCNTs) nanocomposite was prepared by ultrasonicated of MWCNTs (0.5, 1, 2, 4 wt %) in dichloromethane (DCM) and after that the powdered PBT polymer was added to the MWCNTs solution. The non-isothermal crystallization results show that increasing the MWCNTs contents, decreased the melting temperature (Tm) of PBT/(MWCNTs) nanocomposite as compared with pure PBT, while resulting in improving the degree of crystallinity. These results indicated that a little amount of MWCNTs can be evident strong nucleating agent in PBT na

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Estimating the Reliability Function of (2+1) Cascade Model
...Show More Authors

This paper discusses reliability R of the (2+1) Cascade model of inverse Weibull distribution. Reliability is to be found when strength-stress distributed is inverse Weibull random variables with unknown scale parameter and known shape parameter. Six estimation methods (Maximum likelihood, Moment, Least Square, Weighted Least Square, Regression and Percentile) are used to estimate reliability. There is a comparison between six different estimation methods by the simulation study by MATLAB 2016, using two statistical criteria Mean square error and Mean Absolute Percentage Error, where it is found that best estimator between the six estimators is Maximum likelihood estimation method.

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Calibrating the Reservoir Model of the Garraf Oil Field
...Show More Authors

   History matching is a significant stage in reservoir modeling for evaluating past reservoir performance and predicting future behavior. This paper is primarily focused on the calibration of the dynamic reservoir model for the Meshrif formation, which is the main reservoir in the Garraf oilfield. A full-field reservoir model with 110 producing wells is constructed using a comprehensive dataset that includes geological, pressure-volume-temperature (PVT), and rock property information. The resulting 3D geologic model provides detailed information on water saturation, permeability, porosity, and net thickness to gross thickness for each grid cell, and forms the basis for constructing the dynamic reservoir model. The dynamic reservoir mo

... Show More
View Publication Preview PDF
Crossref