Preferred Language
Articles
/
bsj-1289
Pulse Profile Rule in Laser Heating of Opaque Targets in Air
...Show More Authors

A theoretical model is developed to determine time evolution of temperature at the surface of an opaque target placed in air for cases characterized by the formation of laser supported absorption waves (LSAW) plasmas. The model takes into account the power temporal variation throughout an incident laser pulse, (i.e. pulse shape, or simply: pulse profile).
Three proposed profiles are employed and results are compared with the square pulse approximation of a constant power.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Study the correlation between Sunspot Number and Solar Flux during Solar Cycle 24.
...Show More Authors

Abstract

     In this research, a study of the behavior and correlation between sunspot number (SSN) and solar flux (F10.7) have been suggested. The annual time of the years (2008-2017) of solar cycle 24 has been adopted to make the investigation in order to get the mutual correlation between (SSN) and (F10.7). The test results of the annual correlation between SSN & F10.7 is simple and can be represented by a linear regression equation. The results of the conducted study showed that there was a good fit between SSN and F10.7 values that have been generated using the suggested mutual correlation equation and the observed data.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Wavenet (FWN) classifier for medical images
...Show More Authors

 

    The combination of wavelet theory and neural networks has lead to the development of wavelet networks. Wavelet networks are feed-forward neural networks using wavelets as activation function. Wavelets networks have been used in classification and identification problems with some success.

  In this work we proposed a fuzzy wavenet network (FWN), which learns by common back-propagation algorithm to classify medical images. The library of medical image has been analyzed, first. Second, Two experimental tables’ rules provide an excellent opportunity to test the ability of fuzzy wavenet network due to the high level of information variability often experienced with this type of images.

&n

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Baghdad Science Journal
Notes on Approximately Pure Submodules
...Show More Authors

Let R be a commutative ring with identity 1 and M be a unitary left R-module. A submodule N of an R-module M is said to be approximately pure submodule of an R-module, if for each ideal I of R. The main purpose of this paper is to study the properties of the following concepts: approximately pure essentialsubmodules, approximately pure closedsubmodules and relative approximately pure complement submodules. We prove that: when an R-module M is an approximately purely extending modules and N be Ap-puresubmodulein M, if M has the Ap-pure intersection property then N is Ap purely extending.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
F-Compact operator on probabilistic Hilbert space
...Show More Authors

This paper deals with the F-compact operator defined on probabilistic Hilbert space and gives some of its main properties.

View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 2018
Journal Name
Pakistan Journal Of Biotechnology
Correlation between BOD5 and COD for Al-Diwaniyah wastewater treatment plants to obtain biodegradability indices.
...Show More Authors

The present study aims to establish an empirical correlation between biochemical oxygen demand (BOD5) and chemical oxygen demand (COD) of the sewage flowing in Al-Diwaniyah wastewater treatment plant. The strength of the wastewater entering the plant varied from medium to high. High concentrations of BOD5 and COD in the effluent were obtained due to the poor performance of the plant. This was observed from the BOD5 /COD ratios that did not confirm with the typical ratios for the treated sewage. Regression equations for BOD5 and COD removal percentages were suggested which can be used to evaluate rapid effluent assessment after the treatment processes or optimal process control to improve the performance of wastewater treatment plants.

... Show More
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Strengthening and Closing Cracks for Existing Reinforced Concrete Girders Using Externally Post-Tensioned Tendons
...Show More Authors

This research is devoted to study the strengthening technique for the existing reinforced concrete beams using external post-tensioning. An analytical methodology is proposed to predict the value of the effective prestress force for the external tendons required to close cracks in existing beams. The external prestressing force required to close cracks in existing members is only a part from the total strengthening force.
A computer program created by Oukaili (1997) and developed by Alhawwassi (2008) to evaluate curvature and deflection for reinforced concrete beams or internally prestressed concrete beams is modified to evaluate the deflection and the stress of the external tendons for the externally strengthened beams using Matlab

... Show More
View Publication Preview PDF
Publication Date
Thu Aug 01 2024
Journal Name
Smart Agricultural Technology
Smart fertilizer technologies: An environmental impact assessment for sustainable agriculture
...Show More Authors

The global food supply heavily depends on utilizing fertilizers to meet production goals. The adverse impacts of traditional fertilization practices on the environment have necessitated the exploration of new alternatives in the form of smart fertilizer technologies (SFTs). This review seeks to categorize SFTs, which are slow and controlled-release Fertilizers (SCRFs), nano fertilizers, and biological fertilizers, and describes their operational principles. It examines the environmental implications of conventional fertilizers and outlines the attributes of SFTs that effectively address these concerns. The findings demonstrate a pronounced environmental advantage of SFTs, including enhanced crop yields, minimized nutrient loss, improved nut

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Sep 25 2013
Journal Name
International Journal For Sciences And Technology
Synthesis, Characterization, And Antibacterial Activities Of Manganese (II),Cobalt(II), Copper(II) ,Iron (II), Nickel (II) And Cadmium(II) Mixed- Ligand Complexes Containing Amino Acid( L- Lysine) And 1,10-Phenanthroline
...Show More Authors

The research includes the synthesis and identification of the mixed ligands complexes of M(II) Ions in general composition [M(Lyn)2(phen)] Where L- lysine (C6H14N2O2) commonly abbreviated (LynH) as a primary ligand and 1,10-phenanthroline(C12H8N2) commonly abbreviated as "phen," as a secondary ligand . The ligands and the metal chlorides were brought in to reaction at room temperature in ethanol as solvent. The reaction required the following molar ratio [(1:1:2) (metal): phen:2 Lyn -] with M(II) ions, were M = Mn(II),Cu(II), Ni(II), Co(II), Fe(II) and Cd(II). Our research also includes studying the bio–activity of the some complexes prepared against pathogenic bacteria Escherichia coli(-),Staphylococcus(-) , Pseudomonas (-), Bacillus (-)

... Show More