Preferred Language
Articles
/
bsj-747
Detection capability Alttafaria for some materials using a bacterial mutagenesis system
...Show More Authors

Tested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Design a Multi-Choice Fuzzy Control System of the Greenhouse
...Show More Authors

Applications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.

This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidit

... Show More
View Publication Preview PDF
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A New Image Encryption Algorithm Based on Multi Chaotic System
...Show More Authors

       In recent years, encryption technology has been developed rapidly and many image encryption methods have been put forward. The chaos-based image encryption technique is a modern encryption system for images. To encrypt images, it uses random sequence chaos, which is an efficient way to solve the intractable problem of simple and highly protected image encryption. There are, however, some shortcomings in the technique of chaos-based image encryption, such limited accuracy issue. The approach focused on the chaotic system in this paper is to construct a dynamic IP permutation and S-Box substitution by following steps. First of all, use of a new IP table for more diffusion of al

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (10)
Scopus Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Darboux Integrability of a Generalized 3D Chaotic Sprott ET9 System
...Show More Authors

In this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed May 17 2023
Journal Name
Journal Of Engineering
Design of a Differential Chaotic on-off keying communication system
...Show More Authors

Among the available chaotic modulation schemes, differential chaos shift keying (DSCK) offers the perfect noise performance. The power consumption of DCSK is high since it sends chaotic signal in both of 1 and 0 transmission, so it does not represent the optimal choice for some applications like indoor wireless sensing where power consumption is a critical issue. In this paper a novel noncoherent chaotic communication scheme called differential chaos on-off keying (DCOOK) is proposed as a solution of this problem. With the proposed scheme, the DCOOK signal have a structure similar to chaos on-off keying (COOK) scheme with improved performance in noisy and multipath channels by introducing the concept of differential coherency used in DCS

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Pharmaceutical Inventory Database Management System
...Show More Authors

The main aim of this paper are the design and implementation of a pharmaceutical inventory database management system. The system was implemented by creating a database containing information about the stored medicines in the inventory, customers making transactions with the pharmaceutical trading company (which owns the inventory), medical suppliers, employees, payments, etc. The database was connected to the main application using C sharp. The proposed system should help in manag inginventory operations which include adding/updating employees’ information, preparing sale and purchase invoices, generating reports, adding/updating customers and suppliers, tracking customer payments and checking expired medicines in order to be disposed

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of a new orthodontic bonding system (Beauty Ortho Bond)
...Show More Authors

Background: The purpose of the current study was to evaluate the efficacy of a new orthodontic bonding system (Beauty Ortho Bond) involving the shear bond strength in dry and wet environments, and adhesion remnant index (ARI) scores evaluation in regard to other bonding systems (Heliosit and Resilience Orthodontic Adhesives). Materials and methods: Sixty defect free extracted premolars were randomly divided into six groups of 10 teeth each, mounted in acrylic resin, three groups for a dry environment and three for a wet one. Shear bond strength test was performed with a cross head speed of 0.5 mm/min, while surfaces of enamel and bracket-adhesive-enamel surfaces were examined with stereomicroscope For ARI scores evaluation. Data were analyz

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 02 2008
Journal Name
Journal Of The Faculty Of Medicine Baghdad
A Study Of Angiogenesis In Human Colorectal Tumors By Using Anti-Cd34 Antibody. (Assessment By Light Microscope And Computer–Aided Image Analysis System)
...Show More Authors

Background:
Angiogenesis plays a crucial role in tumorigensis; several reports have described a significant increase in microvessel density (MVD) in colorectal carcinogenesis There are
several methods to measure the angiogenesis in neoplasms, but immunohitochemistry seems to be the mainstay of all. This method enable us to measure the tumor microvessel densities highlighted by using antibodies directed against endothelial cell markers like CD31,CD34 or others; then assessment of MVD by manual count of the number of microvessels in what appears to be the most vascular area of the tumor(called the hot spot) using a protocol described by Weidner et al.Automated cellular imaging system is used to analyze

... Show More
View Publication Preview PDF
Crossref