Preferred Language
Articles
/
IhaYBocBVTCNdQwC9TD-
Hourly yield prediction of a double-slope solar still hybrid with rubber scrapers in low-latitude areas based on the particle swarm optimization technique
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Effect of Electrolyte Composition on Structural and Photoelectrochemical Properties of Titanium Dioxide Nanotube Arrays Synthesized by Anodization Technique
...Show More Authors

The present work involves studying the effect of electrolyte composition [@1= 0.5 wt.%  NH4F / 5% H2O / 5% Glycerol (GLY)/ 90%  Ethylene Glycol (EG)] and [ @2= 0.5 wt. % NH4F / 5% H2O / 95%  Ethylene Glycol (EG)]  on the structural and photoelectrochemical properties of titania nanotubes arrays (TNTAs). TNTAs substrates were successfully carried out via anodization technique and were carried out in 40 V for one hour in different electrolytes (@1, and @2). The properties of physicochemical of TNTAs were distinguished via an X-ray Diffractometer (XRD), Field Emission Scanning Electron Microscope (FESEM), an Energy Dispersive X-ray (EDX), and UV–visible diffuse reflectance. T

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Dec 26 2019
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
THE DIURNAL BIRDS OF PREY (RAPTORS) IN THE MESOPOTAMIAN MARSHES OF SOUTHERN IRAQ WITH NOTES ON THEIR CONSERVATION STATUS
...Show More Authors

Birds of prey (Raptors) are top predator avian species that many migrate annually through Mesopotamian marshes in southern Iraq toward their wintering grounds in Arabia and Africa, while others are breeding residents; however, information on their current status is scarce. From January 2016 to April 2019, a total of 20 field expeditions were conducted in the geographical zone of the Mesopotamian marshes, wetlands of international importance. The survey covered the Central Marshes, Al-Hammar and Hawizeh Marsh. One of the objectives of the field surveys is to list the raptors species that wintering and/or migrating through the Mesopotamian marshes and to understand their current spatial and temporal distribution. In the present study, a to

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Mon Jul 01 2013
Journal Name
International Journal Of Computer Applications
Mixed Convection in a Square Cavity Filled with Porous Medium with Heated Bottom Wall
...Show More Authors

Two-dimensional unsteady mixed convection in a porous cavity with heated bottom wall is numerically studied in the present paper. The forced flow conditions are imposed by providing a hydrostatic pressure head at the inlet port that is located at the bottom of one of the vertical side walls and an open vent at the top of the other vertical side wall. The Darcy model is adopted to model the fluid flow in the porous medium and the combination effects of hydrostatic pressure head and the heat flux quantity parameters are carefully investigated. These governing parameters are varied over wide ranges and their effect on the heat transfer characteristics is studied in detail. It is found that the time required to reach a desired temperature at th

... Show More
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
Short Text Semantic Similarity Measurement Approach Based on Semantic Network
...Show More Authors

Estimating the semantic similarity between short texts plays an increasingly prominent role in many fields related to text mining and natural language processing applications, especially with the large increase in the volume of textual data that is produced daily. Traditional approaches for calculating the degree of similarity between two texts, based on the words they share, do not perform well with short texts because two similar texts may be written in different terms by employing synonyms. As a result, short texts should be semantically compared. In this paper, a semantic similarity measurement method between texts is presented which combines knowledge-based and corpus-based semantic information to build a semantic network that repre

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
An Application Domain Based on General Object Oriented Software Models
...Show More Authors

Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects

... Show More
View Publication Preview PDF