Preferred Language
Articles
/
iBaeOogBVTCNdQwCvXV-
Electronic Transfers and (NLO) Properties Predicted by AB Initio Methods with Prove Experimentally
...Show More Authors

Hartree-Fock (HF) method relies in the calculations of nonlinear optical properties (NLO) for benzoic acid molecule. Also, another theoretical study is conducted by using the TD-DFT Density Functional Theory through B3LYP/High Base Set 6-311++G (2d,2p) on Gaussian program09. Moreover, an experimental study has been done to obtain the electrons spectrum for benzoic acid with and without ethanol. While the experimental study is done by using UV/VIS. spectrophotometer. Energy gap values of electronic transition between HOMO and LUMO is obtained from theoretical and experimental results. Consequently, the theoretical result for determining the energy gap calculated from EHOMO-LUMO wasvery close to the results of UV / VIS. spectrum. A theoretical method is considered extremely appropriate towards compounds capable of absorbing in vacuum UV.

Scopus Crossref
View Publication
Publication Date
Wed Aug 17 2022
Journal Name
Aip Conference Proceedings
Study of some physical and mechanical properties of paper sheets treated with different polymeric adhesive solution
...Show More Authors

The present researchers are trying to enhance the properties of paper sheet that used widely in many fields such as printing and packaging. The enhancement of paper quality is also possible to preserve paper documents of all kinds, as they are the true record, full of the history, achievements of the human being and the intellectual and cultural of the country. It is possible to improve its physical and mechanical properties and preserve them from damage through the use of some solutions of polymeric adhesives, which act as protective barriers against water and moisture penetration. The paper also has the advantage of porosity, which has been overcome by using three types of polymeric adhesives (Nitro Cellulose, Polyvinyl alcohol acetate, a

... Show More
Scopus (1)
Scopus
Publication Date
Sun Mar 01 2020
Journal Name
Food Hydrocolloids
Properties and antimicrobial activity of polyvinyl alcohol-modified bacterial nanocellulose packaging films incorporated with silver nanoparticles
...Show More Authors

View Publication
Scopus (178)
Crossref (169)
Scopus Clarivate Crossref
Publication Date
Tue Feb 18 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
A Comprehensive Review on Cryptography Algorithms: Methods and Comparative Analysis
...Show More Authors

The evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi

... Show More
View Publication
Crossref
Publication Date
Sun Dec 16 2018
Journal Name
Al-academy
Guernica Semiotics… methods of Expression between Aesthetic and Semantic Composition
...Show More Authors

This semiotic analytical study has shown that there is a wide diversity in the aesthetic systems and the ranges of reception for the rhetoric and the discourse. The fertility of this semiotic conceptual system monitored this new mature, innovative and advanced level of this new critical analytical method with its different technical and theoretical foundations. Thus, it opened the door wide to new discoveries in the laws, which motivate different artistic texts. Finally, the research is just a start. Can the linguistic methods read the artistic works outside the linguistic authorities? Is it possible to capture the structural transformation in Picasso drawings? Semiotically another researcher in another method (such as deconstruction) ca

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The Complaint's Terms and Methods in Statement of Holy Quran
...Show More Authors

This research deals with a unique and innovative topic, that is the study of complaint in the Quranic text. Despite its importance, it has never been studied before, because most of the complaint 's meanings in the Quranic text is: the in explicit complaint. The mentioned complaint's expressions in different contexts overlap with other purposes, in particular call method and its peripherals like mourn , ask for help , exclamation and others.
Moreover, expressions that reveal complaint are related to the complainant's emotional and psychological status, and the complaint's context.
This research deals with the topic into two sections: The first deals with the important expression of complaint such as: iff, ouah, mooing, crying. The

... Show More
View Publication Preview PDF
Publication Date
Mon May 20 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed A Permutation and Substitution Methods of Serpent Block Cipher
...Show More Authors

     Block cipher technique is one of cryptography techniques to encrypt data block by block. The Serpent is one of AES candidates. It encrypts a 128-bit block by using 32 rounds of a similar calculation utilizing permutations and substitutions. Since the permutations and substitutions of it are static. Then this paper proposes dynamic methods for permutation, substitution and key generation based on chaotic maps to get more security. The proposed methods are analyzed and the results showed that they were able to exceed the weakness resulting from the use of static permutations and substitutions boxes in the original algorithm and also can reduce number of rounds and time usage compared with a classical Serpent block

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Compared Methods of Generating Both Gamma Distribution and Beta Distribution
...Show More Authors

Beta Distribution

Abstract

             Gamma and Beta Distributions has very important in practice in various areas of statistical and applications reliability and quality control of production. and There are a number of methods to generate data behave on according to these distribution. and These methods bassic primarily on the shape parameters of each distribution and the relationship between these distributions and their relationship with some other probability distributions.    &nb

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Computer Sciences And Informatics
Edge Detection Methods: A Review
...Show More Authors

This article studies a comprehensive methods of edge detection and algorithms in digital images which is reflected a basic process in the field of image processing and analysis. The purpose of edge detection technique is discovering the borders that distinct diverse areas of an image, which donates to refining the understanding of the image contents and extracting structural information. The article starts by clarifying the idea of an edge and its importance in image analysis and studying the most noticeable edge detection methods utilized in this field, (e.g. Sobel, Prewitt, and Canny filters), besides other schemes based on distinguishing unexpected modifications in light intensity and color gradation. The research as well discuss

... Show More
View Publication
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
International Educational Scientific Research Journal
EFFICIENTMETHODSOFIRISRECOGNITION
...Show More Authors

Identification by biological features gets tremendous importance with the increasing of security systems in society. Various types of biometrics like face, finger, iris, retina, voice, palm print, ear and hand geometry, in all these characteristics, iris recognition gaining attention because iris of every person is unique, it never changes during human lifetime and highly protected against damage. This unique feature shows that iris can be good security measure. Iris recognition system listed as a high confidence biometric identification system; mostly it is divide into four steps: Acquisition, localization, segmentation and normalization. This work will review various Iris Recognition systems used by different researchers for each recognit

... Show More
Preview PDF
Publication Date
Mon Jan 01 2007
Journal Name
Iraqi Journal Of Science
Adaptive methods for matching problem
...Show More Authors

In this paper, we deal with the problem of general matching of two images one of them has experienced geometrical transformations, to find the correspondence between two images. We develop the invariant moments for traditional techniques (moments of inertia) with new approach to enhance the performance for these methods. We test various projections directional moments, to extract the difference between Block Distance Moment (BDM) and evaluate their reliability. Three adaptive strategies are shown for projections directional moments, that are raster (vertical and horizontal) projection, Fan-Bean projection and new projection procedure that is the square projection method. Our paper started with the description of a new algorithm that is low

... Show More