Preferred Language
Articles
/
ijp-296
Experimental study for the properties of Fe3O4 dusty plasma using the air in vacuum chamber system
...Show More Authors

In this work, we carried out an experimental study of thedusty
plasma by taking the dust material Fe3O4 with radius of the any grain
0.1μm - 0.5μm. In experiment we use air in the vacuum chamber
system under different low pressure (0.1-1) Torr. The results
illustrated that the present of dust particles in the air plasma did not
effect on Paschen minimum which is 0.5 without dust and with Fe3O4
dusty grains.
The effect of Fe3O4 dust particles on plasma parameters can be
notice in direct current system in glow discharge region. The plasma
parameters which were studied in this work represent plasma
potential, floating potential,electron saturation current, temperature
of the electron, the density of the (electron, ion), and Debye length.
The measurements of parameters are taken by four cylindrical probes
which diagnosed at distance 4cm from the diameter of the cathode in
Paschen minimum at pressure 0.5 Torr. The diameter profiles of
plasma parameters in the present of dust are non- uniform. Plasma
potential and the floating potential of probe becomes more negatively
when the dust immersed into plasma region. The electron density
increases in the present of dust particle which lead to decrease the
electron temperature and Debye length. The behavior of those
parameters shows the discharge current and discharge voltage
increases without dust while the discharge current and voltage
decreases when Fe3O4 dust particles embedded.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
DYNAMIC MODELING FOR DISCRETE SURVIVAL DATA BY USING ARTIFICIAL NEURAL NETWORKS AND ITERATIVELY WEIGHTED KALMAN FILTER SMOOTHING WITH COMPARISON
...Show More Authors

Survival analysis is widely applied in data describing for the life time of item until the occurrence of an event of interest such as death or another event of understudy . The purpose of this paper is to use the dynamic approach in the deep learning neural network method, where in this method a dynamic neural network that suits the nature of discrete survival data and time varying effect. This neural network is based on the Levenberg-Marquardt (L-M) algorithm in training, and the method is called Proposed Dynamic Artificial Neural Network (PDANN). Then a comparison was made with another method that depends entirely on the Bayes methodology is called Maximum A Posterior (MAP) method. This method was carried out using numerical algorithms re

... Show More
Preview PDF
Scopus (1)
Scopus
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Isolation of some active materials and aqueous, alcoholic and oil seed extracts of the plant (Curcuma longa (and study Antibacterial and anticancer activity
...Show More Authors

This study included isolation of some active materials from Curcuma longa such as tannins, saponins and volatile oils with percentage of 59%, 31%, and 9% respectively. Also the study included the determination of minerals in Curcuma longa such as " Na, Ca and K" using Flame photometer. The concentrations of these minerals were (14 ppm),(10 ppm) and )76 ppm) respectively. The anti-bacterial activity study was performed for the active materials isolated from Curcuma longa against two genus of pathogenic bacteria, Escherichia Coli and Staphylococcus aurous by using agar-well diffusion method. It appeared from this study that all of the extraction have inhibitory effect on bacteria was used. The inhibition zone diameter varies with

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jul 30 2008
Journal Name
College Of Islamic Sciences
Flag the appropriate between the verses of the Koran
...Show More Authors

The appropriateness of the verses and surahs of the Qur’an, and the connection of their structures, is one of the aspects of the miraculousness of the Holy Qur’an, and it is an honorable knowledge by which the intellect guesses, and by which the value of the one who says what he says is known, and this science was written to appear in the early fourth century AH.
The occasion makes the parts of speech entwined with each other, so that connection is strengthened, and the composition becomes the same as the case of a tight construction that is compatible with the parts.
The Holy Qur’an has adopted a unique approach in its presentation of issues, in contrast to all previous and subsequent approaches. Sometimes he mentions a part

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Sat Aug 01 2015
Journal Name
Journal Of Engineering
A Real-Time Fuzzy Load Flow and Contingency Analysis Based on Gaussian Distribution System
...Show More Authors

Fuzzy logic is used to solve the load flow and contingency analysis problems, so decreasing computing time and its the best selection instead of the traditional methods. The proposed  method is very accurate with outstanding computation time, which made the fuzzy load flow (FLF) suitable for real time application for small- as well as large-scale power systems. In addition that, the FLF efficiently able to solve load flow problem of ill-conditioned power systems and contingency analysis. The FLF method using Gaussian membership function requires less number of iterations and less computing time than that required in the FLF method using triangular membership function. Using sparsity technique for the input Ybus sparse matrix data gi

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 31 2019
Journal Name
Journal Of The College Of Education For Women
The historical presence of Arab tribes and clans in the administratire regions (disputed ) ) 1800 m -1921 m)
...Show More Authors

(disputed areas) before the establishment of the national government in Iraq in 1921, had to search for Arab tribes and clans in which the recipe group is available as a social organization coherent based on the foundations of several of them tribalism and her Land relates know Deira in those areas during the period that preceded the establishment of the national government in Iraq in 1921, and based on the inter girls primary sources and published mostly before the establishment of the national government in Iraq, the source of their information search and direct inquiry.
Research has proved that the tribes and clans of Arab exist in all districts described by (disputed), except (judicial Akre and Tilkaif) and varying degrees of time

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
The Efficiency Of Physics Forceps In Comparison To The Conventional Dental Extraction Forceps: A randomized Clinical Trial
...Show More Authors

Background: Tooth extraction is one of the most commonly performed procedures in dentistry. It is usually a traumatic process often resulting in immediate destruction and loss of alveolar bone and surrounding soft tissues. Various instruments have been described to perform atraumatic extractions which can prevent damage to the paradental structures. The physics forceps is one of those innovations in dental extraction technologies that claim to provide an efficient means for atraumatic dental extractions. Materials and method: A randomized clinical trial was conducted to compare the physics forceps with the conventional forceps for the removal of 28 mandibular single rooted teeth under the following parameters: incidence of crown, root, b

... Show More
View Publication
Scopus (3)
Crossref (5)
Scopus Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
The Kurdish experiment in the process of translation (1898-1991): ئةزمووني كوردي لة ثرؤسةي وةرطيَرِاندا (189 – 1991
...Show More Authors

Translation as a human endeavor has occupied the attention of nations since it bridges the gab between cultures and helps in bringing out national integration. The translation of Kurdish literature started with personal efforts in which newspapers and magazines had played a vital role in supporting translation and paved the way for promoting the publication of Kurdish products.

      The bulk of the materials translated from Arabic exceeds that translated from other languages owing to the influence of religious and authoritarian factors.

The survey of the Kurdish journals was limited to the period 1898-1991 since it marked a radical and historic change represented by the birth of Kurdish journalis

... Show More
View Publication Preview PDF
Crossref