Preferred Language
Articles
/
_RcqMI8BVTCNdQwC7l7R
Quadtree Partitioning Scheme using Fixed Predictor Base
...Show More Authors

Publication Date
Wed Apr 12 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
the Optical Properties of Electrostatic Design and Study Mirror By using Bimurzaev Technique
...Show More Authors

In this research a computational simulation  has been carried out on the design and properties of the electrostatic mirror and a mathematical expression has been suggested  to represent the axial potential of an electrostatic mirror. The electron beam path using the Bimurzaev  technique had been investigated as mirror trajectory with the aid of Runge – Kutta  method. The spherical and chromatic aberration coefficients of mirror has computed and normalized in terms of the focal length. The choice of the mirror depends on the operational requirements. The Electrode shape of mirror two electrodes has been determined by using package SIMION computer program. Computations have shown that the suggested potentials giv

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 15 2004
Journal Name
Iraqi Journal Of Laser
Interstitial Photocoagulation of Low Anal Fistula using 810 nm Diode Laser: Prospective Study
...Show More Authors

Many conservative sphincter-preserving procedures had been described to be effective in
healing of anal fistula without excision or de roofing.
Objective: To verify the outcome of mere photocoagulation of the fistula tract on healing of low anal
fistula.
Materials and Methods: Using 810nm diode laser, the tracts of low anal fistulae in a cohorts of six male
patients (mean age of 32 yr) had been photocoagulated by retrograde application of laser light through an
orb tip optical fiber threaded in to the tract. Swabs for culture and sensitivity testing were obtained before
and after laser application. Patients were followed up regularly to announce fistula healing.
Results: Mean laser exposure time was 6.6 min., mean

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Wed Jan 26 2022
Journal Name
Iraqi Journal Of Science
Potentiometric Determination of Mebeverine Hydrochloride Using Imprinted Molecular Polymer in PVC Matrix Membraneā€
...Show More Authors

Publication Date
Sun Aug 08 2021
Journal Name
Proceedings Of International Conference On Emerging Technologies And Intelligent Systems
Drone Altitude Control Using Proportional Integral Derivative Technique and Recycled Carbon Fiber Structure
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Mon Nov 09 2020
Journal Name
Heat Transfer
Experimental performance of cooling photovoltaic panels using geothermal energy in an arid climate
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Jun 06 2021
Journal Name
Materials
Strengthening of Continuous Reinforced Concrete Deep Beams with Large Openings Using CFRP Strips
...Show More Authors

To accommodate utilities in buildings, different sizes of openings are provided in the web of reinforced concrete deep beams, which cause reductions in the beam strength and stiffness. This paper aims to investigate experimentally and numerically the effectiveness of using carbon fiber reinforced polymer (CFRP) strips, as a strengthening technique, to externally strengthen reinforced concrete continuous deep beams (RCCDBs) with large openings. The experimental work included testing three RCCDBs under five-point bending. A reference specimen was prepared without openings to explore the reductions in strength and stiffness after providing large openings. Openings were created symmetrically at the center of spans of the other specimens

... Show More
Scopus (20)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Mon Apr 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimate AR(3) by Using Levinson-Durbin Recurrence & Weighted Least Squares Error Methods
...Show More Authors

In this study, we investigate about the estimation improvement for Autoregressive model of the third order, by using Levinson-Durbin Recurrence (LDR) and Weighted Least Squares Error ( WLSE ).By generating time series from AR(3) model when the error term for AR(3) is normally and Non normally distributed and when the error term has ARCH(q) model with order q=1,2.We used different samples sizes and the results are obtained by using simulation. In general, we concluded that the estimation improvement for Autoregressive model for both estimation methods (LDR&WLSE), would be by increasing sample size, for all distributions which are considered for the error term , except the lognormal distribution. Also we see that the estimation improve

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of Iraqi Light Naphtha Octane Number Using Pt Supported HMOR Zeolite Catalyst
...Show More Authors

The hydroconversion of Iraqi light straight run naphtha was studied on zeolite catalyst. 0.3wt.%Pt/HMOR catalyst was prepared locally and used in the present work. The hydroconversion performed on a continuous fixed-bed laboratory reaction unit. Experiments were performed in the temperature range of 200 to 350°C, pressure range of 3 to 15 bars, LHSV range of 0.5-2.5h-1, and the hydrogen to naphtha ratio of 300.

The results show that the hydroconversion of Iraqi light straight naphtha increases with increase in reaction temperature and decreases with increase in LHSV.

High octane number isomers were formed at low temperature of 240°C. The selectivity of hydroisomerization improved by increasing reaction pressu

... Show More
View Publication Preview PDF