An atomic force microscope (AFM) technique is utilized to investigate the polystyrene (PS) impact upon the morphological properties of the outer as well as inner surface of poly vinyl chloride (PVC) porous fibers. Noticeable a new shape of the nodules at the outer and inner surfaces, namely "Crater nodules", has been observed. The fibers surface images have seen to be regular nodular texture at the skin of the inner and outer surfaces at low PS content. At PS content of 6 wt.%, the nodules structure was varied from Crater shape to stripe. While with increasing of PS content, the pore density reduces as a result of increasing the size of the pore at the fiber surface. Moreover, the test of 3D-AFM images shows that the roughness of both su
... Show MoreNanostructure of chromium oxide (Cr2O3-NPs) with rhombohedral structure were successfully prepared by spray pyrolysis technique using Aqueous solution of Chromium (III) chloride CrCl3 as solution. The films were deposited on glass substrates heated to 450°C using X-ray diffraction (XRD) shows the nature of polycrystalline samples. The calculated lattice constant value for the grown Cr2O3 nanostructures is a = b = 4.959 Å & c = 13.594 Å and the average crystallize size (46.3-55.6) nm calculated from diffraction peaks, Spectral analysis revealed FTIR peak characteristic vibrations of Cr-O Extended and Two sharp peaks present at 630 and 578 cm-1 attributed to Cr-O “stretching
... Show MoreBig data usually running in large-scale and centralized key management systems. However, the centralized key management systems are increasing the problems such as single point of failure, exchanging a secret key over insecure channels, third-party query, and key escrow problem. To avoid these problems, we propose an improved certificate-based encryption scheme that ensures data confidentiality by combining symmetric and asymmetric cryptography schemes. The combination can be implemented by using the Advanced Encryption Standard (AES) and Elliptic Curve Diffie-Hellman (ECDH). The proposed scheme is an enhanced version of the Certificate-Based Encryption (CBE) scheme and preserves all its advantages. However
... Show MoreUser confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract
... Show MoreA new computer-generated optical element called a monochrome image hologram (MIH) is described. A real nonnegative function to represent the transmittance of a synthesized hologram is used. This technique uses the positions of the samples in the synthesized hologram to record the phase information of a complex wavefront. Synthesized hologram is displayed on laser printer and is recorded on a film. Finally the reconstruction process is done using computerized .
Medical image security is possible using digital watermarking techniques. Important information is included in a host medical image in order to provide integrity, consistency, and authentication in the healthcare information system. This paper introduces a proposed method for embedding invisible watermarking in the 3D medical image. The cover medical image used is DICOM which consists of a number of slices, each one representing a sense, firstly must separate the ROI (Region of Interest) and NROI (Not Region Of Interest) for each slice, the separation process performed by the particular person who selected by hand the ROI. The embedding process is based on a key generated from Arnold's chaotic map used as the position of a pixel in
... Show MoreGypseous soil covers approximately 30% of Iraqi lands and is widely used in geotechnical and construction engineering as it is. The demand for residential complexes has increased, so one of the significant challenges in studying gypsum soil due to its unique behavior is understanding its interaction with foundations, such as strip and square footing. This is because there is a lack of experiments that provide total displacement diagrams or failure envelopes, which are well-considered for non-problematic soil. The aim is to address a comprehensive understanding of the micromechanical properties of dry, saturated, and treated gypseous sandy soils and to analyze the interaction of strip base with this type of soil using particle image
... Show MoreThis research deals with the most important heritage in Iraq, which are the Iraqi marshes, especially Abu Zarag marsh in Al-Nasiriyah city south of Iraq. The research is divided into two parts. The first part deals with evaluating the water quality parameters of Abu Zarag marsh for the period from December 2018 to April 2019 which is the flooding season. The parameters are Temperature, pH, Electrical Conductivity, Total Dissolved Solids, Alkalinity, Total Hardness, Turbidity, Dissolved Oxygen, Sulfate, Nitrate. The second part is a comparison between the water quality parameters during the recent period with the same period during the previous years from 2014 to 2019. The results are
In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.