Preferred Language
Articles
/
OxeHP48BVTCNdQwCfWa0
A turbidimetric method for the quantitative determination of cyproheptadine hydrochloride in tablets using an optoelectronic detector based on the LEDs array
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 19 2017
Journal Name
Arabian Journal For Science And Engineering
A New Method to Tune a Fractional-Order PID Controller for a Twin Rotor Aerodynamic System
...Show More Authors

View Publication
Scopus (31)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2005
Journal Name
Alustath Journal For Human And Social Sciences
An evaluation study of Islamic websites on the Internet
...Show More Authors

The study aims to introduce the Islamic sites available on the Internet and determine the criteria that contribute to evaluating these sites to indicate their value, topics, and services, while evaluating a simple random sample of the general Islamic sites, which number (35) sites. The results were presented in (8) tables. The study concluded To a set of conclusions, including: (465) “Islamic” websites were seized during the research period, and they are constantly increasing. They were classified according to the name of the website (domain name) com, org, net, edu, and also according to topics such as general Islamic websites and websites of holy places. Mosques, sites of sheikhs, etc. Among the best general Islamic websites are: Isla

... Show More
Preview PDF
Publication Date
Fri Jul 23 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
On the dynamical behavior of an eco-epidemiological model
...Show More Authors

The aim of this article is to study the dynamical behavior of an eco-epidemiological model. A prey-predator model comprising infectious disease in prey species and stage structure in predator species is suggested and studied. Presumed that the prey species growing logistically in the absence of predator and the ferocity process happened by Lotka-Volterra functional response. The existence, uniqueness, and boundedness of the solution of the model are investigated. The stability constraints of all equilibrium points are determined. The constraints of persistence of the model are established. The local bifurcation near every equilibrium point is analyzed. The global dynamics of the model are investigated numerically and confronted with the obt

... Show More
Preview PDF
Scopus Clarivate
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
A Mathematical Approach for Computing the Linear Equivalence of a Periodic Key-Stream Sequence Using Fourier Transform
...Show More Authors

A mathematical method with a new algorithm with the aid of Matlab language is proposed to compute the linear equivalence (or the recursion length) of the pseudo-random key-stream periodic sequences using Fourier transform. The proposed method enables the computation of the linear equivalence to determine the degree of the complexity of any binary or real periodic sequences produced from linear or nonlinear key-stream generators. The procedure can be used with comparatively greater computational ease and efficiency. The results of this algorithm are compared with Berlekamp-Massey (BM) method and good results are obtained where the results of the Fourier transform are more accurate than those of (BM) method for computing the linear equivalenc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Flow Injection Spectrophotometric Determination of Thymol using 4-Aminoantipyrine and Copper(II) Nitrate
...Show More Authors

Flow-injection (FI) spectrophotometric method has been developed for the analysis of thymol in pharmaceutical preparations. The method is based on organic coupling reaction between thymol and 4-amino antipyrine in the presence of alkaline medium to form an intense stable red color complex with copper nitrate that has a maximum absorption at 490 nm. Optimum conditions for determination of the drug was investigated .The calibration graph was linear over the range of 5-500 µg.ml-1 of thymol . The limit of detection (LOD) and limit of quantification (LOQ) were 1.81 ?g mL-1 and 3.60 ?g mL-1 respectively .The proposed method was applied satisfactorily to the determination of thymol in mouth wash preparations. The procedure is characterized by

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
Determination of the Optimum Conditions for Removal of Congo Red Dye by Peroxidase Enzyme Plant
...Show More Authors

The pollution producing from textile industries effluents is growing since the years, due to at discharged lots of it in water without treatment. The resulting effluent is colourful, highly toxic, and poses a significant environmental hazard. This problem can be solved by using enzymic biological treatment, where the Congo red dye was used with concentrations (100,200,300,500) mg /L, pH values (3,4,5,6,7,8), and variable temperatures (25,35,45)°C, the best removal of Congo red (CR) dye  under optimum conditions for degradation was at  concentration of 100 mg/L, at (pH 6, 25 °C) with efficiency of 99.85 % using the peroxidase enzyme extracted from red radish plant, while the removal percentage decreased when increase dye concentration

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref