Preferred Language
Articles
/
excJWJIBVTCNdQwCmaz8
Porosity evaluation of in-service thermal barrier coated turbine blades using a microwave nondestructive technique

Scopus Clarivate Crossref
View Publication
Publication Date
Tue May 01 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Spectral Analysis of the Effects of Variation in Electrodes' Area for Dielectric Barrier Discharge Actuator

     In this work, one configuration was used to study the electrical discharge resulting from the dielectric barrier. This configuration consists of a sheet of epoxy/Al composite with dimensions of 75 mm in length, 25 mm in width, and 3 mm in thickness. This panel is located at the center of the electrodes, so that the distance between each of the electrodes and the plate is 2 mm and plasma is generated at these distances. The relationship between voltage and current with changing the frequency of the equipment as well as changing the area of ​​exposure to the upper electrode or changing its length has been studied. The length of the top electrode varies at 0, 10, 20, 30, and 40 mm from the center of the electrodes producing exp

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue May 15 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study of the Influence of Annealing Temperature on the Structural and Optical Properties of ZnTe Prepared by Vacuum Thermal Evaporation Technique

   The ZnTe alloy was prepared as  deposited thin films on the glass substrates at a thickness of 400±20 nm using vacuum evaporation technique at pressure (1 × 10-5) mbar and room temperature. Then the thin films under vacuum (2 × 10-3 mbar) were annealing at (RT,100 and 300) °C for one hour. The structural properties were studied by using X-ray diffraction and AFM, the results show that the thin films had approached the single crystalline in the direction (111) as preferred orientation of the structure zinc-blende for cubic type, with small peaks of tellurium (Te) element for all prepared thin films. The calculated crystallite size (Cs) decreased with the increase in the anne

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Computer Applications
Content-based Image Retrieval (CBIR) using Hybrid Technique

Image retrieval is used in searching for images from images database. In this paper, content – based image retrieval (CBIR) using four feature extraction techniques has been achieved. The four techniques are colored histogram features technique, properties features technique, gray level co- occurrence matrix (GLCM) statistical features technique and hybrid technique. The features are extracted from the data base images and query (test) images in order to find the similarity measure. The similarity-based matching is very important in CBIR, so, three types of similarity measure are used, normalized Mahalanobis distance, Euclidean distance and Manhattan distance. A comparison between them has been implemented. From the results, it is conclud

... Show More
View Publication
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
Adaptive inter frame compression using image segmented technique

The computer vision branch of the artificial intelligence field is concerned with developing algorithms for analyzing video image content. Extracting edge information, which is the essential process in most pictorial pattern recognition problems. A new method of edge detection technique has been introduces in this research, for detecting boundaries.

           Selection of typical lossy techniques for encoding edge video images are also discussed in this research. The concentration is devoted to discuss the Block-Truncation coding technique and Discrete Cosine Transform (DCT) coding technique. In order to reduce the volume of pictorial data which one may need to store or transmit,

... Show More
Crossref
View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Image Compression Using 3-D Two-Level Technique

In this paper three techniques for image compression are implemented. The proposed techniques consist of three dimension (3-D) two level discrete wavelet transform (DWT), 3-D two level discrete multi-wavelet transform (DMWT) and 3-D two level hybrid (wavelet-multiwavelet transform) technique. Daubechies and Haar are used in discrete wavelet transform and Critically Sampled preprocessing is used in discrete multi-wavelet transform. The aim is to maintain to increase the compression ratio (CR) with respect to increase the level of the transformation in case of 3-D transformation, so, the compression ratio is measured for each level. To get a good compression, the image data properties, were measured, such as, image entropy (He), percent r

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Medical Image Segmentation using Modified Interactive Thresholding Technique

Medical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform w

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Brain Tumor Detection Method Using Unsupervised Classification Technique

Magnetic  Resonance  Imaging  (MRI)  is  one  of  the  most important diagnostic tool. There are many methods to segment the

tumor of human brain. One of these, the conventional method that uses pure image processing techniques that are not preferred because they need human interaction for accurate segmentation. But unsupervised methods do not require any human interference and can segment   the   brain   with   high   precision.   In   this   project,   the unsupervised  classification methods have been used in order to detect the tumor  disease from MRI images.    These metho

... Show More
View Publication Preview PDF
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Solar Powered Air-Conditioning Using Absorption Refrigeration Technique

The present work includes design, construction and operates of a prototype solar absorption refrigeration system, using methanol as a refrigerant to avoid any refrigerant that cause global warming and greenhouse effect. Flat plate collector was used because it’s easy, ninexpensive and efficient. Many test runs (more than 50) were carried out on the system from May to October, 2013; the main results were taken between the period of July 15, 2013 to August 15, 2013 to find the maximum C.O.P, cooling, temperature and pressure of the system. The system demonstrates a maximum generator temperature of 93.5 oC, on July 18, 2013 at 2:30 pm, and the average mean generator temperature Tgavr was 74.7 °C, for this period. The maximum pressure Pg

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Tue Mar 14 2023
Journal Name
Iraqi Journal Of Science
Improve PGP Cryptography Protocol Using Genetic NTRU Technique

The strong cryptography employed by PGP (Pretty Good Privacy) is one of the best available today. The PGP protocol is a hybrid cryptosystem that combines some of the best features of both conventional and public-key cryptography. This paper aim to improve PGP protocol by combined between the Random Genetic algorithm, NTRU (N-th degree Truncated polynomial Ring Unit) algorithm with PGP protocol stages in order to increase PGP protocol speed, security, and make it more difficult in front of the counterfeiter. This can be achieved by use the Genetic algorithm that only generates the keys according to the Random Genetic equations. The final keys that obtained from Genetic algorithm were observed to be purely random (according to the randomne

... Show More
View Publication Preview PDF