Preferred Language
Articles
/
XhbXFooBVTCNdQwC55Ck
A reliable numerical simulation technique for solving COVID-19 model
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Nov 29 2018
Journal Name
Journal Of Electronic Materials
Numerical Modeling of 193-nm Excimer Laser Ablation on CR-39 Polymer
...Show More Authors

View Publication
Scopus (5)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Numerical Prediction of Bond-Slip Behavior in Simple Pull-Out Concrete Specimens
...Show More Authors

In this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of t

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of Engineering
Numerical Investigation of Aerodynamic Characteristics of Supercritical RAE2822 Airfoil with Gurney Flap
...Show More Authors

Gurney flap (GF) is well-known as one of the most attractive plain flaps because of the simple configuration and effectiveness in improving the lift of the airfoil. Many studies were conducted, but the effects of GF on the various airfoil types need to be further investigated. This study aimed to clarify the effect of GF in the case of the supercritical airfoil RAE2822. This research includes a steady, two-dimensional computational investigation carried out on the supercritical airfoil type RAE-2822 to analyze Gurney flap (GF) effects on the aerodynamic characteristics of this type of airfoil utilizing the Spalart-Allmaras turbulence model within the commercial software Fluent. The airfoil with the Gurney flap was analyz

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
J. Baghdad For Sci
Numerical Simulations of Imaging Extrasolar Planets using Circular and Square Apodize Apertures
...Show More Authors

Numerical simulations are carried out to assess the quality of the circular and square apodize apertures in observing extrasolar planets. The logarithmic scale of the normalized point spread function of these apertures showed sharp decline in the radial frequency components reaching to 10-36 and 10-34 respectively and demonstrating promising results. This decline is associated with an increase in the full width of the point spread function. A trade off must be done between this full width and the radial frequency components to overcome the problem of imaging extrasolar planets.

Publication Date
Sun Jan 01 1995
Journal Name
المجلة العراقية للاحياء المجهرية
NUMERICAL CHARACTERIZATION OF HALOBACTERIUM SPECIES ISOLATED FROM LOCAL HIGH SALIENT DESERTIFICATION SOILS
...Show More Authors

ABSTRACT Fifty extremely halophilic bacteria were isolated from local high salient soils named Al-Massab Al-Aam in south of iraq and were identified by using numerical taxonomy. Fourty strains were belong to the genus Halobacterium which included Hb. halobium (10%). Hb. salinarium (12.5%), Hb.cutirubrum (17.5%), Hb-saccharovorum (12.5%), Hb. valismortis (10%) and Hb. volcanii (37.5%). Growth curves were determined. Generation time (hr) in complex media and logarithmic phase were measured and found to be 10.37±0.59 for Hb. salinarium. 6.49 ± 0.24 for Hb.cutirubrum. 6.70±0.48 for Hb-valismonis, and 11.24 ± 0.96 for Hb. volcanii

Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
Graphical password based mouse behavior technique
...Show More Authors
Abstract<p>This paper proposes a new password generation technique on the basis of mouse motion and a special case location recognized by the number of clicks to protect sensitive data for different companies. Two, three special locations click points for the users has been proposed to increase password complexity. Unlike other currently available random password generators, the path and number of clicks will be added by admin, and authorized users have to be training on it.</p><p>This method aims to increase combinations for the graphical password generation using mouse motion for a limited number of users. A mathematical model is developed to calculate the performance</p> ... Show More
View Publication
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Fri Aug 28 2020
Journal Name
Iraqi Journal Of Science
Image Retrieval Using Data Mining Technique
...Show More Authors

Even though image retrieval is considered as one of the most important research areas in the last two decades, there is still room for improvement since it is still not satisfying for many users. Two of the major problems which need to be improved are the accuracy and the speed of the image retrieval system, in order to achieve user satisfaction and also to make the image retrieval system suitable for all platforms. In this work, the proposed retrieval system uses features with spatial information to analyze the visual content of the image. Then, the feature extraction process is followed by applying the fuzzy c-means (FCM) clustering algorithm to reduce the search space and speed up the retrieval process. The experimental results show t

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2002
Journal Name
Iraqi Journal Of Physics
New DCT-Based Image Hiding Technique
...Show More Authors

A new technique for embedding image data into another BMP image data is presented. The image data to be embedded is referred to as signature image, while the image into which the signature image is embedded is referred as host image. The host and the signature images are first partitioned into 8x8 blocks, discrete cosine transformed “DCT”, only significant coefficients are retained, the retained coefficients then inserted in the transformed block in a forward and backward zigzag scan direction. The result then inversely transformed and presented as a BMP image file. The peak signal-to-noise ratio (PSNR) is exploited to evaluate the objective visual quality of the host image compared with the original image.

View Publication Preview PDF
Publication Date
Thu Apr 27 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Signature Verification Based on Moments Technique
...Show More Authors

In this research we will present the signature as a key to the biometric authentication technique. I shall use moment invariants as a tool to make a decision about any signature which is belonging to the certain person or not. Eighteen voluntaries give 108 signatures as a sample to test the proposed system, six samples belong to each person were taken. Moment invariants are used to build a feature vector stored in this system. Euclidean distance measure used to compute the distance between the specific signatures of persons saved in this system and with new sample acquired to same persons for making decision about the new signature. Each signature is acquired by scanner in jpg format with 300DPI. Matlab used to implement this system.

... Show More
View Publication Preview PDF