Preferred Language
Articles
/
NIYp1YYBIXToZYAL-rWa
Simultaneous and consecutive charging and discharging of a PCM-based domestic air heater with metal foam
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Risk-Based Inspection Due to Corrosion Consequences for Oil and Gas Flowline: A Review
...Show More Authors

   The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipeli

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges
...Show More Authors

The rapid development of telemedicine services and the requirements for exchanging medical information between physicians, consultants, and health institutions have made the protection of patients’ information an important priority for any future e-health system. The protection of medical information, including the cover (i.e. medical image), has a specificity that slightly differs from the requirements for protecting other information. It is necessary to preserve the cover greatly due to its importance on the reception side as medical staff use this information to provide a diagnosis to save a patient's life. If the cover is tampered with, this leads to failure in achieving the goal of telemedicine. Therefore, this work provides an in

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Hybrid Transform Based Denoising with Block Thresholding
...Show More Authors

A frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Synthesis a nd Characterization of Some New Transition Metal Complexes of Amino Thiadiazole
...Show More Authors

New complcxcof        Cu (ll),Ni(ll)  ,Co(ll),  and Zn(ll)  wi th 2- amino-5-p-Fiouro Phenyl 1,3,4-Thiadiazole  have been synthesized  . The  products  were isolated , studied  and characterized by physical measurements, i.e., (Ff -IR) ,UV-Vis and  the melting points were determined .The new Schiff base (L) has been used to prepare some complexes  .The   prepared  complexes  were   identified  and   their tructural geometry were suggested.

View Publication Preview PDF
Publication Date
Mon Sep 11 2006
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis a nd Characterization of Some New Transition Metal Complexes of Amino Thiadiazole
...Show More Authors

New complexes of Cu (ll), Ni (ll), Co (ll), and Zn (ll) wi th 2-amino-5-p-Fiouro Phenyl 1, 3, 4-Thiadiazole have been synthesized. The products were isolated, studied and characterized by physical measurements, ie,(Ff-IR), UV-Vis and the melting points were determined. The new Schiff base (L) has been used to prepare some complexes. The prepared complexes were identified and their structural geometry were suggested

Publication Date
Tue Mar 28 2023
Journal Name
Iranian Journal Of Ichthology
Histological study of lingual papillae on the tongue of the adult Iraqi domestic cat, Felis
...Show More Authors

The results of this study showed that the tongue of the adult Iraqi domestic cat is divided into three regions of apex, body and root. The dorsal surface of all regions possesses five types of lingual papillae, two mechanical which are filiform and cylindrical papillae, while the other three types are taste papillae which are foliate, fungiform and circumvallate papillae, while these papillae are absent on its ventral surface. The histological examination of all tongue areas revealed that it consisted of three tunica, the tunica mucosa and the tunica submucosa (the lamina propria) and the tunica muscularis. The tunica mucosa consisted of the epithelial lining, which is a stratified squamous epithelial tissue covering the lingual papillae, a

... Show More
Preview PDF
Publication Date
Fri Sep 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Simultaneous Determination of Trace Mefenamic Acid in Pharmaceutical Samples via Flow Injection Fluorometry
...Show More Authors

Mefenamic acid belongs to non-steroidal anti-inflammatory drugs that are used widely for the treatment of analgesia. Our aim from this study is to establish a new assay for the quantitative determination of mefenamic acid (MFA) in the pharmaceutical sample by two sensitive and rapid flow injection-fluorometric methods. A homemade fluorometer was used in fluorescence measurements, which using solid-state laser diode 405 and 532 nm as a source, combined with a continuous flow injection technique. The first method depends on the effect of MFA on calcein blue (CLB) fluorescence at 405 nm. Another method is a study of rhodamine-6G (Rh-6G) fluorescence after adding MFA, and recording at 532 nm. Optimum parameters as fluorescent dye concen

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref