Preferred Language
Articles
/
cRZGBocBVTCNdQwC7i8W
Calibrating Distance Sensors for Terrestrial Applications Without Groundtruth Information
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Ovonic Research
Manufacturing Br:CO3O4 /Si Heterojunction For Photodetector Applications
...Show More Authors

This research including, CO3O4 was prepared by the chemical spry pyrolysis, deposited film acceptable to assess film properties and applications as photodetector devise, studying the optical and optoelectronics properties of Cobalt Oxide and effect of different doping ratios with Br (2, 5, 8)%. the optical energy gap for direct transition were evaluated and it decreases as the percentage Br increase, Hall measurements showed that all the films are p-type, the current–voltage characteristic of Br:CO3O4 /Si Heterojunction show change forward current at dark varies with applied voltage, high spectral response, specific detectivity and quantum efficiency of CO3O4 /Si detector with 8% of Br ,was deliberate, extreme value with 673nm.

... Show More
View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 07 2022
Journal Name
Journal Of Educational And Psychological Researches
Personal Distance and the Feeling of comfort and annoyance
...Show More Authors

The aim of the current research is to identify the personal distance between members of society, as well as, to identify the feelings of satisfaction and positivity from respecting the permissible personal distance. The study also aims to identify the feelings of annoyance and comfort from approaching and going beyond personal distance and not respecting it. To achieve these goals, the researchers reviewed previous literature, theories, and studies that dealt with personal distance. The researchers reached a number of results; first, personal distance is not a law but rather a cultural guiding principle for social and professional morals. Second, there are four distances (intimate distance, the distance between friends, social distance,

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Approximations of Minimum Approach Distance in Electron Mirroring Phenomena
...Show More Authors
Abstract<p>The minimum approaches distance of probing electrons in scanning electron microscope has investigated in accordance to mirror effect phenomenon. The analytical expression for such distance is decomposed using the binomial expansion. With aid of resulted expansion, the distribution of trapped electrons within the sample surface has explored. Results have shown that trapped electron distributes with various forms rather an individual one. The domination of any shape is mainly depend on the minimum approaches distance of probing electrons</p>
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Cyber-security And Digital Forensics (ijcsdf)
Genetic Algorithm Approach for Risk Reduction of Information Security
...Show More Authors

Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information security (InfoSecu) is risk management. There are a great deal of research works and standards in security risk management (ISRM) including NIST 800-30 and ISO/IEC 27005. However, only few works of research focus on InfoSecu risk reduction, while the standards explain general principles and guidelines. They do not provide any implementation details regarding ISRM; as such reducing the InfoSecu risks in uncertain environments is painstaking. Thus, this paper applied a genetic algorithm (GA) for InfoSecu risk reduction in uncertainty. Finally, the ef

... Show More
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Fri Jan 04 2019
Journal Name
Drinking Water Engineering And Science Discussions
Froth Production in Potable Water without Chemicals
...Show More Authors

Abstract. Froth flotation is a well-known solid-liquid separation technique. Hydrophobicity is the main driving force for such processes. Hydrophobic solids attach to air bubbles and rise up while hydrophilic or less hydrophobic species settle down. Froth can be produced with chemical frothers such as alcohols and polyglycols. However, the use of chemicals limits the use of this separation method in applications such as drinking water, food, and pharmaceutical industries. Therefore, developing a technique that produces froth without adding any chemicals would be useful to such industries. This work demonstrates that with suitable operating parameters a 27 cm froth height can be obtained in a 20 cm diameter column by using an air

... Show More
View Publication
Crossref
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Proceeding Bromometric Phenol Assay without Starch Indicator
...Show More Authors

         In this research, we exclude starch indicator preparation,that is  used in official phenol assay method. The liberated iodine, in presence of chloroform, was acting as indicator and titrated with sodium thiosulfate until getting a sharp colorless end point. Similarly, starch was cancelled during both blank and standardization of bromine water solution experiments needed in phenol assay. The results obtained were the same volumes and weights as that achieved using starch with just about 0.03% difference in sample procedure. Finally, this work will enable us to save time, effort, fuel and materials spended in laboratory.

Key word:- Phenol, assay, starch indicator

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Dec 23 2025
Journal Name
Philosophy Journal
Richard Rorty: Toward a Philosophy Without Mirrors
...Show More Authors

View Publication