The proliferation of cellular network enabled users through various positioning tools to track locations, location information is being continuously captured from mobile phones, created a prototype that enables detected location based on using the two invariant models for Global Systems for Mobile (GSM) and Universal Mobile Telecommunications System (UMTS). The smartphone application on an Android platform applies the location sensing run as a background process and the localization method is based on cell phones. The proposed application is associated with remote server and used to track a smartphone without permissions and internet. Mobile stored data location information in the database (SQLite), then transfer it into location API to obtain locations result implemented in Google Maps. Track a smartphone with fixed identifiers mostly SSN (SIM (Subscriber Identity Module) Serial Number) and IMEI (International Mobile Equipment Identity) derived from an identifying string unique to the user's device. The result located place is Moderate correct according to the (GSM) and (UMTS) cellular networks which is used for obtaining location information.
Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to
... Show MoreDust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS so
... Show MoreAbstract Background: This study is aimed to assess the maxillary incisors’ root position, angulation, and buccal alveolar bone thickness in both genders and different classes of malocclusion using cone‑beam computed tomography (CBCT). Materials and Methods: Two hundred and six CBCT images were gathered and analyzed by three‑dimensional On‑Demand software to measure the variables of 803 maxillary central and lateral incisors. Genders and class difference was determined by unpaired t‑test, one‑way ANOVA, and Chi‑square tests. Results: Buccal root position of the maxillary incisors accounted for in the majority of the cases followed by the middle and palatal positions. The thickness of alveolar bone appears to have nearly the sam
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
This paper reports test results and describes a numerical investigation of the effectiveness of using carbon fibre reinforced polymer (CFRP) fabrics for strengthening concrete cylinders that have been undamaged and damaged due to heating under preload. The purpose of this research was to investigate whether there is any difference in the performance of CFRP-wrapped cylinders if the wrapping is done under preload, and those for which neither heating, cooling nor wrapping was done under preload. The cylinders were exposed to 30% of maximum load at ambient temperature during heating and cooling before being wrapped under preload. Of 18 Ø 100 × 200 mm identical cylinders, 6 were left as control samples without heating, 12 were exposed t
... Show MoreIn recent years, the search for economic and environmentally friendly alternatives has become a global necessity to achieve sustainability and preserve raw materials. From this concept, natural bitumen (NB) derived from sulphur springs is now one of the most promising alternative energy resources for many applications, especially in asphalt pavement construction. Its low price and abundance characterise NB since sulphur springs produce thousands of tonnes of NB annually and are used in very limited fields. Two main objectives were adopted for this work. The first objective is to examine the virgin NB properties from five sulphur springs and compare them with petroleum asphalt. The second objective is to enhance NB properties by appl
... Show MoreAbstract
The nuclear structure of 28-40Si isotopes toward neutron dripline has been investigated in framework of shell model with Skyrme-Hrtree-Fock method using certain Skyrme parameterizations. Moreover, investigations of static properties such as nuclear densities for proton, neutron, mass, and, charge densities with their corresponding rms radii, neutron skin thicknesses, binding energies, separation energies, shell gap, and pairing gap have been performed using the most recent Skyrme parameterization. The calculated results have been compared with available experimental data to identify which of these parameterizations introduced equivalent results with the ex
... Show MoreKE Sharquie, AA Noaimi, HA Al-Mudaris, Journal of Cosmetics, Dermatological Sciences and Applications, 2013 - Cited by 4
A dynamic analysis method has been developed to investigate and characterize embedded delamination on the dynamic response of composite laminated structures. A nonlinear finite element model for geometrically large amplitude free vibration intact plate and delamination plate analysis is presented using higher order shear deformation theory where the nonlinearity was introduced in the Green-Lagrange sense. The governing equation of the vibrated plate were derived using the Variational approach. The effect of different orthotropicity ratio, boundary condition and delamination size on the non-dimenational fundamental frequency and frequency ratios of plate for different stacking sequences are studied. Finally th
... Show More