Preferred Language
Articles
/
WBeYWJABVTCNdQwChYdm
Synthesis of ZnS Quantum Dots for QDs-LED hybrid device with different cathode materials
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Classifying Illegal Activities on Tor Network using Hybrid Technique
...Show More Authors

    With the freedom offered by the Deep Web, people have the opportunity to express themselves freely and discretely, and sadly, this is one of the reasons why people carry out illicit activities there. In this work, a novel dataset for Dark Web active domains known as crawler-DB is presented. To build the crawler-DB, the Onion Routing Network (Tor) was sampled, and then a web crawler capable of crawling into links was built. The link addresses that are gathered by the crawler are then classified automatically into five classes. The algorithm built in this study demonstrated good performance as it achieved an accuracy of 85%. A popular text representation method was used with the proposed crawler-DB crossed by two different supervise

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 28 2018
Journal Name
Iraqi Journal Of Science
Advanced Password Authentication Protection by Hybrid Cryptography & Audio Steganography
...Show More Authors

     Data transmission in public communication system is not safe since of interception and improper manipulation by attacker. So, the attractive solution for these problems is to design high secure system that reduce the ability of attacker from getting sensitive information such as (account ID, passwords, etc.). The best way is combine two high secure techniques: steganography technique, which is the method of hiding any secret information like data, password and image behind any cover file and cryptography, which is convert the data to unreadable data. This paper suggests a crypto-stego authentication method to provide a highly secured authentication. The proposed method is utilized audio steganography and AES Cryp

... Show More
View Publication Preview PDF
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Hybrid Images Compression and Transmitted Using MC-CDMA System
...Show More Authors

In this paper, the combined source coding with Multi Carrier Code Division Multiple Access (MC-CDMA) system is proposed, where the transmission of the compressed image produced from source coding through Additive White Gaussian Noise (AWGN) channel for a single user and multi users. In which the (MC-CDMA) system removes Inter Symbol Interference (ISI) and Inter Carrier Interference (ICI). The hybrid compression system of Discrete Cosine Transform (DCT) and predictive coding (PC) technique are integrated as a source coding. The simulation results indicates that the transmission system of a single user was much better than the transmission system of multi users. When the number of users increased, the Bit Error Rate (BER) increased. For a

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
On the Split Mersenne and Mersenne-Lucas Hybrid Quaternions
...Show More Authors

In this communication, introduce the split Mersenne and Mersenne-Lucas hybrid quaternions, also obtaining generating functions and Binet formulas for these hybrid quaternions and investigating some properties among them.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Performance Comparison of Different Advanced Control Schemes for Glucose Level Control under Disturbing Meal
...Show More Authors

Abstract

In this work, diabetic glucose concentration level control under disturbing meal has been controlled using two set of advanced controllers. The first set is sliding mode controllers (classical and integral) and the second set is represented by optimal LQR controllers (classical and Min-, ax). Due to their characteristic features of disturbance rejection, both integral sliding mode controller and LQR Minmax controller are dedicated here for comparison. The Bergman minimal mathematical model was used to represent the dynamic behavior of a diabetic patient’s blood glucose concentration to the insulin injection. Simulations based on Matlab/Simulink, were performed to verify the performance of each controll

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 30 2023
Journal Name
Iraqi Journal Of Science
Implementation of a Circular Shape Patch Antenna at 2.4 GHz for Different Wireless Communications
...Show More Authors

      In this work, the circular patch antenna was fabricated and analyzed. Microwave Studio (version 2019) computer simulation technology (CST) was used to design the circular patch antenna. The material FR-4 was used to build this antenna, using the computer numerical control (CNC) method to implement this work. For the purpose of accomplishing this design, the values ​​of the resonant frequency, dielectric constant and dielectric thickness of the material used as in 4.424, 2.4 GHz and 0.159 cm respectively were used as inputs to the CST program to get the said program outputs for the required antenna radius with the logarithmic function (F) of the circular patch antenna 1.6909 cm and 1.7415 cm respectively. Practically, the b

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect of Composition and Dielectric Properties for (YBCO) Superconductor Compound in Different Preparation Methods
...Show More Authors

     The superconductor compound (YBa2Cu2.8Zn0.2O7+δ) is prepared by solid state reaction (SSR), Sol-gel (SG) and laser Pulse deposition (PLD) methods. We used the X-ray diffraction technique, which shows an orthorhombic crystalline system for all the samples, and increase in the high-phase (Y-123) and decrease in low-phase and vary in proportion according to the method of preparation with the emergence of some impurities. The behavior of the samples in terms of electrical resistance and critical temperature was investigated all samples showed superconducting behavior. The properties of the dielectric (real dielectric constant, imaginary dielectric constant, loss tangent, alternating electrical conductivity) were s

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Tue Dec 31 2019
Journal Name
Journal Of Economics And Administrative Sciences
Comparing Different Estimators for the shape Parameter and the Reliability function of Kumaraswamy Distribution
...Show More Authors

In this paper, we used maximum likelihood method and the Bayesian method to estimate the shape parameter (θ), and reliability function (R(t)) of the Kumaraswamy distribution with two parameters l , θ (under assuming the exponential distribution, Chi-squared distribution and Erlang-2 type distribution as prior distributions), in addition to that we used method of moments for estimating the parameters of the prior distributions. Bayes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Estimator for the Scale Parameter of the Normal Distribution Under Different Prior Distributions
...Show More Authors

In this study, we used Bayesian method to estimate scale parameter for the normal distribution. By considering three different prior distributions such as the square root inverted gamma (SRIG) distribution and the non-informative prior distribution and the natural conjugate family of priors. The Bayesian estimation based on squared error loss function, and compared it with the classical estimation methods to estimate the scale parameter for the normal distribution, such as the maximum likelihood estimation and th

... Show More
View Publication Preview PDF
Crossref