Preferred Language
Articles
/
alkej-634
A Fully Computerized Method to Backup the Router Configuration File
...Show More Authors

This paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.

    The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Jan 25 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
A Comparative Evaluation of Gutta-Percha and Sealer Removal of Rotary Niti File Retreatment Systems
...Show More Authors

Forty lower premolars with single root canals prepared with ProtaperNext files to size 25, and obturated with GP/sealer using lateral compaction. Teeth divided randomly into four groups (group n=10). Protaper universal retreatment kit (PUR), D-Race desobturation files (DRD), R-Endo retreatment kit (RE) and Hedstrom (H) files (control) were used to remove GP/sealer in each group. Removal effectiveness assessed by measuring the GP /sealer remnants in the roots after sectioning them into two halves. Stereomicroscope with a digital camera used to capture digital images. Images processed by ImageJ software to measure the percentage of GP/sealer remnants surface area in total, coronal, middle and apical areas of the canal. In the coronal area,

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 05 2019
Journal Name
Iraqi Journal Of Physics
Study of optical bistability in a fully optimized laser Fabry-Perot system
...Show More Authors

The analytical study of optical bistability is concerned in a fully
optimized laser Fabry-Perot system. The related phenomena of
switching dynamics and optimization procedure are also included.
From the steady state of optical bistability equation can plot the
incident intensity versus the round trip phase shift (φ) for different
values of dark mistuning 




12
,
6
,
3
,
1.5
0 , o
   
 or finesse (F= 1, 5, 20,
100). In order to obtain different optical bistable loops. The inputoutput
characteristic for a nonlinear Fabry-Perot etalon of a different
values of finesse (F) and using different initial detuning (φ0) are used
in this rese

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 24 2017
Journal Name
Journal Of Engineering
A New Analytic Method to Tune a Fractional Order PID Controller
...Show More Authors

This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a thir

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 24 2017
Journal Name
Journal Of Engineering
A new analytic method to tune a fractional order PID controller
...Show More Authors

This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time

... Show More
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Nonlinear Ritz Approximation for the Camassa-Holm Equation by Using the Modify Lyapunov-Schmidt method
...Show More Authors

 

          In this work, the modified Lyapunov-Schmidt reduction is used to find a nonlinear Ritz approximation of Fredholm functional defined by the nonhomogeneous Camassa-Holm equation and Benjamin-Bona-Mahony. We introduced the modified Lyapunov-Schmidt reduction for nonhomogeneous problems when the dimension of the null space is equal to two.  The nonlinear Ritz approximation for the nonhomogeneous Camassa-Holm equation has been found as a function of codimension twenty-four.

View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Jun 30 2006
Journal Name
Al-kindy College Medical Journal
The Use of Spiral Computerized Tomography in the Diagnosis of Middle –Third Facial Fractures as Compared to Plain Radiography
...Show More Authors

Background: Trauma is one of the most common
clinical problems that confront the maxillofacial
surgeon and radiologist alike. Middle third facial
fractures are diagnosed primarily on the bases of
clinical examination and plain radiographs than can
result in much preoperative speculation.
Objective: To assess the advantages of spiral
computerized tomography over conventional
radiography in the pre-surgical evaluation of middle
third facial fractures.
Methods: Thirty patients with thirty-eight facial
fractures were studied, all patients were examined
clinically, by plain radiography and then by spiral CT.
Results: Of the 38 middle-third fractures, 16
(42.1%) were zygomatic fractures, 8 (21.1%) were

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Computation of The Efficiency ofHarmonic Generation Using Cascading Configuration.
...Show More Authors

In the present work theoretical relations are derived for the efficiency evaluation for the generation of the third and the fourth harmonics u$ing crystal cascading configuration. These relations can be applied to a wide class of nonlinear optical materials. Calculations are made for beta barium borate (BBO) crystal with ruby laser /.=694.3 nm . The case study involves producing the third harmonics at X. =231.4 nm of the fundamental beam. The formula of efficiency involves many parameters, which can be changed to enhance the efficiency. The results showed that the behavior of the efficiency is not linear with the crystal length. It is found that the efficiency increases when the input power increases. 'I'he walk-off length is calculated for

... Show More
View Publication Preview PDF
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Iraqi Journal Of Physics
Theoretical Investigations of Electronic and Optical Properties of Vanadium Doped Wurtzite Zinc Oxide from First Principle Calculation Method
...Show More Authors

In this study lattice parameters, band structure, and optical characteristics of pure and V-doped ZnO are examined by employing (USP) and (GGA) with the assistance of First-principles calculation (FPC) derived from (DFT). The measurements are performed in the supercell geometry that were optimized. GGA+U, the geometrical structures of all models, are utilized to compute the amount of energy after optimizing all parameters in the models. The volume of the doped system grows as the content of the dopant V is increased. Pure and V-doped ZnO are investigated for band structure and energy bandgaps using the Monkhorst–Pack scheme's k-point sampling techniques in the Brillouin zone (G-A-H-K-G-M-L-H). In the presence of high V content, the ban

... Show More
View Publication Preview PDF
Crossref (4)
Crossref