Preferred Language
Articles
/
_Rbr9YsBVTCNdQwCr-ZQ
A proposed encryption technique of different texts using circular link lists
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
MIXED CONVECTION PHENOMINA AFFECTED BY RADIATION IN A HORIZONTAL RECTANGULAR DUCT WITH COCENTRIC AND ECCENTRIC CIRCULAR CORE
...Show More Authors

The numerical investigation has been performed to study the radiation affected steady state laminar mixed convection induced by a hot inner varied positions circular core in a horizontal rectangular channel for a fully developed flow. To examine the effects of thermal radiation on thermo fluid dynamics behavior in the eccentric geometry channel, the generalized body fitted co-ordinate system is introduced while the finite difference method is used for solving the radiative transport equation. The governing equations which used are continuity, momentum and energy equations. These equations are normalized and solved using the Vorticity-Stream function. After validating numerical results for the case without radiation, the detailed radiatio

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Journal Of Engineering
Experimental Study on Heat Transfer and Friction Factor Characteristics of Single Layer Graphene Based DI-water Nanofluid in a Circular Tube under Laminar Flow and Different Heat Fluxes as Boundary Conditions
...Show More Authors

An experimental study was performed to estimate the forced convection heat transfer performance and the pressure drop of a single layer graphene (GNPs) based DI-water nanofluid in a circular tube under a laminar flow and a uniform heat flux boundary conditions. The viscosity and thermal conductivity of nanofluid at weight concentrations of (0.1 to 1 wt%) were measured. The effects of the velocity of flow, heat flux and nanoparticle weight concentrations on the  enhancement of the heat transfer are examined. The Nusselt number of the GNPs nanofluid was enhanced as the heat flux and the velocity of flow rate  increased, and the maximum Nusselt number  ratio (Nu nanofluid/ Nu base fluid)   and thermal performance factor

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 01 2023
Journal Name
Iraqi Journal Of Physics
Photometry Technique to Map Elements’ Distribution on Comets’ Nuclei Surfaces Using a New Method
...Show More Authors

This study is unique in this field. It represents a mix of three branches of technology: photometry, spectroscopy, and image processing. The work treats the image by treating each pixel in the image based on its color, where the color means a specific wavelength on the RGB line; therefore, any image will have many wavelengths from all its pixels. The results of the study are specific and identify the elements on the nucleus’s surface of a comet, not only the details but also their mapping on the nucleus. The work considered 12 elements in two comets (Temple 1 and 67P/Churyumoy-Gerasimenko). The elements have strong emission lines in the visible range, which were recognized by our MATLAB program in the treatment of the image. The percen

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Mar 25 2018
Journal Name
Biomedical And Pharmacology Journal
Apical Extrusion of Debris and Irrigants After using Different Irrigation Needles and Systems With Different Depth of Penetration (A Comparative Study)
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Lagrange Interpolation for Mobile Agent Connection Encryption
...Show More Authors

A new proposed technique for secure agent communication is used to transfer data and instructions between agent and server in the local wireless network. The proposed technique depends on the two stages of encryption processing (AES algorithm and proposed Lagrange encryption key generation supported by XOR gate) for packets encryption. The AES key was manipulated by using proposed Lagrange interpolation key generated in order to avoid the weak encryption keys. A good multi encryption operation with a fast encryption time was proposed with a high quality connection operation.

 

View Publication Preview PDF
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Strategies of Understanding Written Texts in EFL Classrooms
...Show More Authors

Reading strategies are of interest for what they reveal about the ways readers manage their interaction with written texts and how these strategies are related to text understanding, acquisition ,storage ,and retrieval of information .In EFL comprehension lessons, the students try to work out interpretations of the meaning related to the written word through the usage of different comprehension strategies. Yet, there are moments where the participants in the classroom fail to reach a successful understanding of the passage read despite the guidance of the teacher. The present research aims at investigating and identifying moments of comprehension failure and reasons behind them .It also aims at specifying the different strategies used in

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 15 2021
Journal Name
Al-adab Journal
A Socio-Pragmatic Analysis of Responses to Impoliteness in some Selected English and Arabic Literary Texts
...Show More Authors

View Publication
Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Baghdad Science Journal
Surfactant Cloud Point Extraction as a Procedure of Preconcentrating for Metoclopramide Determination Using Spectro Analytical Technique
...Show More Authors

In current article an easy and selective method is proposed for spectrophotometric estimation of metoclopramide (MCP) in pharmaceutical preparations using cloud point extraction (CPE) procedure. The method involved reaction between MCP with 1-Naphthol in alkali conditions using Triton X-114 to form a stable dark purple dye. The Beer’s law limit in the range 0.34-9 μg mL-1 of MCP with r =0.9959 (n=3) after optimization. The relative standard deviation (RSD) and percentage recoveries were 0.89 %, and (96.99–104.11%) respectively. As well, using surfactant cloud point extraction as a method to extract MCP was reinforced the extinction coefficient(ε) to 1.7333×105L/mol.cm in surfactant-rich phase. The small volume of organi

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref