Preferred Language
Articles
/
aRYq6okBVTCNdQwC_Y7n
A true random number generator based on the photon arrival time registered in a coincidence window between two single-photon counting modules
...Show More Authors

True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Aug 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Effect OF Film Thickness And Annealing Time on Structural And Optical Propertieis Of The Oxides (Fe2030, Co304) And Their Mixtures
...Show More Authors

Thin film technology is one of the most important technologies
that have contributed to the development of semiconductors and their
applications in several industrial fields. The Iron Oxides (Fe20) and
(Co3O4) thin films and their applications are of importance, in that these
two materials are considered as important industrial materials, and used
in spectrally selective coating, temperature sensors, resistive heaters, and
photo cells.
Thin films of Iron Oxide (Fe20,), Cobalt Oxide (Co304) and
their mixtures in different ratios (75:25, 50:50, 25:75) were prepared by
the method of chemical spray pyrolysis deposition at different thicknesses
(77s t S200) nm on cover-glass substrates: thickness of (1) mm at

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
A study of Soil Invertebrates community in a Date - Palm plantation in Baghdad, Iraq
...Show More Authors

Soil invertebrates community an important role as part of essential food chain and responsible for the decomposition in the soil, helps soil aeration , nutrients recycling and increase agricultural production by providing the essential elements necessary for photosynthesis and energy flow in ecosystems.The aim of the present study was to investigate the soil invertebrates community in one of the date palms plantation in Aljaderia district South of Baghdad, , and their relationships with some physical and chemical properties of the soil , as Five randomly distributed replicates of soil samples were collected monthly. Invertebrates samples were sorted from the soil with two methods, direct method to isolate large invertebrates and indirec

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Feb 12 2016
Journal Name
International Journal Of Advanced Statistics And Probability
Two fixed point theorems in generalized metric spaces
...Show More Authors

<p>In this paper, we prove there exists a coupled fixed point for a set- valued contraction mapping defined on X× X , where X is incomplete ordered G-metric. Also, we prove the existence of a unique fixed point for single valued mapping with respect to implicit condition defined on a complete G- metric.</p>

View Publication
Crossref
Publication Date
Sat Jul 01 2000
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
BLOOD PARASITES OF TWO BEE-EATERS iN IRAQ
...Show More Authors

Examination of 241 specimens of two bee-eater species, Merops apiaster and Merops
superciliosus persicus reveal recording of Haemoproteus meropis (Zagar, 1945) emend.
Bennett, 1978 and H. manwelli Bennett, 1978 for the first time in Iraq. A new species
Haemoproteus hudaidensis sp. nov. is described. Microfilariae are also infected the two host
species. The results are discussed with the pertinent literature and the necessary comparision
of morphometric measurements of the recorded parasites with that previously reported is
provided along with a taxonomic key including the newly described haemoproteid.

View Publication Preview PDF
Publication Date
Fri Sep 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design Active Filter Based on Genetic Algorithm
...Show More Authors

The  lossy-FDNR  based  aclive  fil ter has an  important   property among  many  design  realizations. 'This includes  a significant reduction in component count particularly in the number  of OP-AMP which consumes   power.  However  the·  problem  of  this   type  is the  large component spreads  which affect the fdter performance.

In  this  paper   Genetic   Algorithm   is  applied   to  minimize   the component  spread   (capacitance  and  resistance  p,read). The minimization of these spreads allow the fil

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 23 2013
Journal Name
International Journal Of Computer Applications
Image Compression based on Quadtree and Polynomial
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Modeling Dynamic Background based on Linear Equation
...Show More Authors

     Detection moving car in front view is difficult operation because of the dynamic background due to the movement of moving car and the complex environment that surround the car, to solve that, this paper proposed new method based on linear equation to determine the region of interest by building more effective background model to deal with dynamic background scenes. This method exploited the permitted region between cars according to traffic law to determine the region (road) that in front the moving car which the moving cars move on. The experimental results show that the proposed method can define the region that represents the lane in front of moving car successfully with precision over 94%and detection rate 86

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients
...Show More Authors

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 03 2024
Journal Name
Proceedings Of Ninth International Congress On Information And Communication Technology
Offline Signature Verification Based on Neural Network
...Show More Authors

The investigation of signature validation is crucial to the field of personal authenticity. The biometrics-based system has been developed to support some information security features.Aperson’s signature, an essential biometric trait of a human being, can be used to verify their identification. In this study, a mechanism for automatically verifying signatures has been suggested. The offline properties of handwritten signatures are highlighted in this study which aims to verify the authenticity of handwritten signatures whether they are real or forged using computer-based machine learning techniques. The main goal of developing such systems is to verify people through the validity of their signatures. In this research, images of a group o

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More