Preferred Language
Articles
/
ijp-200
Secure communications by chaotic carrier signal using Lorenz model
...Show More Authors

In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Indoor risk assessment of radon gas in the science college buildings-University of Mustansiriyah using RAD-7 detector
...Show More Authors

In the present work, a set of indoor Radon concentration measurements was carried out in a number of rooms and buildings of Science College in the University of Mustansiriyah for the first time in Iraq using RAD-7 detector which is an active method for short time measuring compared with the passive method in solid state nuclear track detectors (SSNTD's). The results show that, the Radon concentrations values vary from 9.85±1.7 Bq.m-3 to 94.21±34.7 Bq.m-3 with an average value 53.64±26 Bq.m-3 which is lower than the recommended action level 200-300 Bq/m3 [ICRP, 2009].
The values of the annual effective dose (A.E.D) vary from 0.25 mSv/y to 2.38 mSv/y, with an average value 1.46±0.67 mSv/y which is lower than the recommended the rang

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Journal Of Economics And Administrative Sciences
Using the Critical Path Method to Find Time of Constriction for Helicopters Airport Project in the Oil Fields
...Show More Authors

This research is considered one of the important researches in Maysan Governorate, as it focuses on the construction of helicopter airport project in the oil fields of the Maysan Oil Company, where the oil general companies in Maysan Governorate suffer from the cost of transporting the foreign engineering experts and the governing equipment of sustaining oil industry from Iraq's international airports to oil fields and vice versa. Private international transport companies transport foreign engineering from the oil fields to Iraqi airports and vice versa, and other international security companies take action to provide protection for foreign engineering experts during transportation. Hence, this process is very costly.

 &nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Study of the Land Cover of Razzaza Lake during the Past 25 Years Using Remote Sensing Methods
...Show More Authors

In this study, the Earth's surface was studied in Razzaza Lake for 25 years, using remote sensing methods. Images of the satellites Landsat 5 (TM) and 8 (OLI) were used to study and determine the components of the land cover. The study covered the years 1995-2021 with an interval of 5 years, as this region is uninhabited, so the change in the land cover is slow. The land cover was divided into three main classes and seven subclasses and classified using the maximum likelihood classifier with the help of training sets collected to represent the classes that made up the land cover. The changes detected in the land cover were studied by considering 1995 as a reference year. It was found that there was a significant reduction in the water mass

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Blood donors appointment booking and managing system using PC and mobile web browsers in current pandemic (COVID-19)
...Show More Authors

<span>Blood donation is the main source of blood resources in the blood banks which is required in the hospitals for everyday operations and blood compensation for the patients. In special cases, the patients require fresh blood for compensation such as in the case of major operations and similar situations. Moreover, plasma transfusions are vital in the current pandemic of coronavirus disease (COVID-19). In this paper, we have proposed a donation system that manages the appointments between the donors and the patient in the case of fresh blood donation is required. The website is designed using the Bootstrap technology to provide suitable access using the PC or the smart phones web browser. The website contains large database

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sat Jul 30 2022
Journal Name
Global Academic Journal Of Linguistics And Literature
A Critical Stylistic Analysis of Transcultural Identity in Lyer’s The Global Soul (2001) Using the Tool of Negation
...Show More Authors

This study is intended to examine the concept of transcultural identity in the travel book The Global Soul: Jet Lag, Shopping Malls, and the Search for Home by (Iyer, 2001). Jeffries’ model of critical stylistics (2010) (henceforth, CS) has been selected to analyze the book. To be more specific, Negation is selected to analyze the concept under study. As such, the study aims at finding out how Negation is used to portray ideological meanings representing the concept of transcultural identity in one non-fictional travel book; and finding out the ideologies related to the concept analyzed. The analysis of the data shows that Negation is a suitable analytical tool to reach the ideational meaning of the text towards the concept of tra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 23 2025
Journal Name
Journal Of Craniofacial Surgery
Gender Determination in Forensic Dentistry Using Bonwill’s Triangle Measurements From CBCT Scans: A Study on the Iraqi Population
...Show More Authors
Background:

The purpose of this study is to illuminate the role of CBCT in forensic dentistry through variations of mandibular measurements of Bonwill’s triangles in gender determination among the Iraqi population.

Materials and methods:

In this retrospective study 70 CBCT scans were analyzed to measure the Bonwill’s triangle, 35 for males and 35 for females aged between 20 and 50 years, all data were collected at the oral and maxillofacial radiology department in Ghazi AL-Hariri hospital for 3 months, and the data were obtained using a Kavo CBCT device (3D On De

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon May 04 2020
Journal Name
Environmental Engineering Research
Experimental and modeling study of water defluoridation using waste granular brick in a continuous up-flow fixed bed
...Show More Authors

Contamination of surface and groundwater with excessive concentrations of fluoride is of significant health hazard. Adsorption of fluoride onto waste materials of no economic value could be a potential approach for the treatment of fluoride-bearing water. This experimental and modeling study was devoted to investigate for the first the fluoride removal using unmodified waste granular brick (WGB) in a fixed bed running in continuous mode. Characterization of WGB was carried out by FT-IR, SEM, and EDX analysis. The batch mode experiments showed that they were affected by several parameters including contact time, initial pH, and sorbent dosage. The best values of these parameters that provided maximum removal percent (82%) with the in

... Show More
Scopus (17)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2015
Journal Name
Ieee Transactions On Microwave Theory And Techniques
On the Design of Gyroelectric Resonators and Circulators Using a Magnetically Biased 2-D Electron Gas (2-DEG)
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref