Preferred Language
Articles
/
ijl-132
Generation of 629 nm Pulsed Laser Using an Optical Parametric Amplifier
...Show More Authors

The main purpose of this work is the construction of an optical parametric amplifier (OPA) to generate a 629 nm pulsed laser. KTP nonlinear crystals were used for both parametric oscillation and amplification. A singly resonant parametric oscillator (OPO) is constructed to generate a signal of 1.54 μm and idler of 3.4 μm when the OPO system is pumped by 1.064 μm Q – switched Nd: YAG laser. The signal was then mixed with the pumping beam in OPA system to form the wanted wavelength. The obtained optical conversion efficiency was 60%.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Developing and Organizing an Easy Work Environment for Users of Computers Using Information Technology
...Show More Authors

The study aims to implement a serial security technology system to organize a comfortable work environment for users of computers in the General Directorate of Education in Baghdad Karkh3. The most important findings of the study are the application of a serial technology system. It is connected with scientific goals that show the scientific structure of computer learning and its applications.  It considers global learning systems and take into account the ease and scientific flow of the class of elderly employees. In addition, employees of other categories, are the outputs of the sequential technological system. The aim is to create a purposeful technological system and keep pace with global developments, to gain experience, skills and

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
An Internet of Things Botnet Detection Model Using Regression Analysis and Linear Discrimination Analysis
...Show More Authors

The Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.

This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Tue Nov 08 2022
Journal Name
Buildings
An Experimental Study of Granular Material Using Recycled Concrete Waste for Pavement Roadbed Construction
...Show More Authors

Rapid worldwide urbanization and drastic population growth have increased the demand for new road construction, which will cause a substantial amount of natural resources such as aggregates to be consumed. The use of recycled concrete aggregate could be one of the possible ways to offset the aggregate shortage problem and reduce environmental pollution. This paper reports an experimental study of unbound granular material using recycled concrete aggregate for pavement subbase construction. Five percentages of recycled concrete aggregate obtained from two different sources with an originally designed compressive strength of 20–30 MPa as well as 31–40 MPa at three particle size levels, i.e., coarse, fine, and extra fine, were test

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Computers And Concrete
Improving the seismic performance of reinforced concrete frames using an innovative metallic-shear damper
...Show More Authors

Scopus (9)
Scopus
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Iraqi Journal Of Science
An Improved Method to Recognize the Iraqi License Plates Using Local Projections
...Show More Authors

The License Plate (LP), is a rectangular metal plate that contains numbers and letters. This plate is fixed onto the vehicle's body. It is used as a mean to identify the vehicle. The License Plate Recognition (LPR) system is a mean where a vehicle can be identified automatically using a computer system. The LPR has many applications, such as security applications for car tracking, or enforcing control on vehicles entering restricted areas (such as airports or governmental buildings). This paper is concerned with introducing a new method to recognize the Iraqi LPs using local vertical and horizontal projections, then testing its performance. The attained success rate reached 99.16%, with average recognition time around 0.012 second for re

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Designing a Quality System using the Goals Programming Method -An Applied Research
...Show More Authors

Due to the continuous development in society and the multiplicity of customers' desires and their keeping pace with this development and their search for the quality and durability of the commodity that provides them with the best performance and that meets their needs and desires, all this has led to the consideration of quality as one of the competitive advantages that many industrial companies compete for and which are of interest to customers and are looking for. The research problem showed that the Diyala State Company for Electrical Industries relies on some simple methods and personal experience to monitor the quality of products and does not adopt scientific methods and modern programs. The aim of this research is to desi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Improving the Iraqi Oil Well Cement Properties Using Barolift: an Experimental Investigation
...Show More Authors

Cement is a major component in oil and gas drilling operations that is used to maintain the integrity of boreholes by preventing the movement of formation fluids through the annular space and outside the casing. In 2019, Iraq National Oil Company ordered all international oil and gas companies which are working in Iraq to use Iraqi cement (made in Iraq) in all Iraqi oil fields; however, the X-ray fluorescence (XRF) and compressive strength results in this study show that this cement is not matching with American Petroleum Institute (API) standards.

During this study, barolift was used to improve the properties of Iraqi cement used in oil wells at high pressure and high temperature (HPHT). Barolift (1 g) was added to cement admixt

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 30 2021
Journal Name
Iraqi Journal Of Science
Concealing a Secret Message in a Colour Image Using an Electronic Workbench
...Show More Authors

Steganography is the art of concealing security data in media, such as pictures, audio, video, text, and protocols. The objective of this paper is hiding a secret message in a colour image to prevent an attacker from accessing the message. This is important because more people use the Internet all the time and network connections are spread around the world. The hidden secret message uses two general algorithms that are embedded and extracted. This paper proposes a new algorithm to conceal a secret message in a colour image in LSB. This algorithm includes three phases: 1) dividing the colour image into a number of blocks, 2) concealing the secret message, and 3) transmitting the stego-image from the sender in a multiplexer network and re

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jul 24 2024
Journal Name
Journal Of Plant Protection Research
Developing smart sprayer for weed control using an object detection algorithm (yolov5)
...Show More Authors

Spraying pesticides is one of the most common procedures that is conducted to control pests. However, excessive use of these chemicals inversely affects the surrounding environments including the soil, plants, animals, and the operator itself. Therefore, researchers have been encouraged to...

View Publication