Preferred Language
Articles
/
ijp-200
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Current Science
Histopathological changes in golden hamsters induced by Leishmania tropica
...Show More Authors

.

Preview PDF
Publication Date
Wed Dec 15 2010
Journal Name
Iraqi Journal Of Laser
Treatment of Oral Conditions by 810 nm Diode Laser
...Show More Authors

When laser light incident on biological tissue, it is either reflected from the
surface of the tissue (e.g. the skin) or scattered inside the tissue or absorbed .The laser light will be
absorbed by water, hemoglobin and melanin. Absorption is also highly dependent on wave-length of
laser radiation. The absorbed light is converted into kinetic energy leading to laser effect that when
appropriately applied can produce reaction ranging from incision, vaporization to coagulation. Aim of
the study: To evaluate the efficiency of diode Laser 810 ± 20nm in treatment of oral lesions. Methods:
6 patients (2 females and 4 males) with different oral lesions were treated in the hospital of specialized
surgeries by the use of dio

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Bioethanol Production by Candida tropicalis Isolated from Sheep Dung
...Show More Authors

 Microorganisms have an active role in biotechnology for example yeasts, especially in some genus like Saccharomyces, Pichia, and CandidaC.tropicalis one of the most important species of Candida and despite it is one of the causative agents of candidiasis but it has a major role in the production of many chemical compounds. C.tropicalis  in the previous study was isolated from sheep dung and morphologically and molecularly classified the result of sequencing was elucidate 100% similarity between the studied isolate and other isolates inserted in DNA Data Bank of Japan DDBJ, physiologically this isolate tolerated 6% ethanol concentration in broth media with the ability to the pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Aug 31 2019
Journal Name
Iraqi Journal Of Physics
Spectroscopic Diagnostic of Cadmium Sulfide Plasma Produced By LIBS
...Show More Authors

Abstract

       The current study was carried out to reveal the plasma parameters such as ,the electron temperature ( ), electron density (ne) , plasma frequency (fp), Debye length ( ) , Debye number (   for  CdS to employ the LIBS for the purpose of analyzing and determining spectral emission lines using . The results of electron temperature for CdS range (0.746-0.856) eV , the electron density(3.909-4.691)×1018 cm-3. Finally ,we discuss plasma parameters of CdS  through  nano second  laser generated plasma .

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Sep 11 2018
Journal Name
Association Of Arab Universities Journal Of Engineering
Estimation of the Total Dissolved Salts by Hydrometer Test
...Show More Authors

View Publication
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Desulfurization of Diesel Fuel by Oxidation and Solvent Extraction
...Show More Authors

This research presents a study in ultra-desulfurization of diesel fuel produced from conventional hydro desulfurization process, using oxidation and solvent extraction techniques. Dibenzothiophene (DBT) was the organosulfur compound that had been detected in sulfur removal. The oxidation process used hydrogen peroxide as an oxidant and acetic acid as homogeneous catalyst . The solvent extraction process used acetonitrile (ACN) and N-methyl – 2 - pyrrolidone (NMP) as  extractants . Also the effect of five parameters (stirring speed :150 , 250 , 350 , and 450) rpm, temperature (30 , 40 , 45 , and 50) oC, oxidant/simulated diesel fuel ratio (0.5 , 0.75 , 1 , and 1.5) , catalyst/oxidant ratio(0.125,0.25,0.5

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
BatchHeavy MetalsBiosorption by Punica granatum Peels: Equilibrium andKinetic Studies
...Show More Authors

This research was conducted to study the feasibility of using fruit peels as biosorbent for removal of Pb+2, Cu+2 and Zn+2 ions from simulated wastewater. A waste biomass of Pomegranate Peel or Punicagranatum L. (P. granatum L.) was chosen as neutral biosorbent in this study.Fourier transformation infrared (FTIR) was used to characterize the surface of PGP, the results confirm that amino, carboxylic, hydroxyl and carbonyl group on the surface of PGP. Different parameters such as initial concentration range between (25-200) mg/L, pH (3-7), contact time (1-2) hour, amount of sorbent (0.1- 4) gm, agitation speed range (200- 500) rpm and temperature (25- 50oC), influencing the sorp

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 01 2009
Journal Name
Baghdad University
Treatment of Cutaneous Leishmaniasis by Topical 25% Podophyllin Solution
...Show More Authors

AG Al-Ghazzi, 2009

View Publication
Publication Date
Tue Aug 01 2017
Journal Name
International Journal Of Scientific & Engineering Research
Integrated System of Information hiding by Applying Three levels
...Show More Authors

MB Mahmood, BN Dhannoon

View Publication
Publication Date
Tue Feb 02 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Increasing Security in Steganography by Combining LSB and PRGN
...Show More Authors

With the increasing rate of unauthorized access and attacks, security of confidential data is of utmost importance. While Cryptography only encrypts the data, but as the communication takes place in presence of third parties, so the encrypted text can be decrypted and can easily be destroyed. Steganography, on the other hand, hides the confidential data in some cover source such that the existence of the data is also hidden which do not arouse suspicion regarding the communication taking place between two parties. This paper presents to provide the transfer of secret data embedded into master file (cover-image) to obtain new image (stego-image), which is practically indistinguishable from the original image, so that other than the indeed us

... Show More