Preferred Language
Articles
/
ijp-307
Effect of Pb dopant On A.C mechanism of ZnS thin films
...Show More Authors

Vacuum evaporation technique was used to prepare pure and doped ZnS:Pb thin films at10% atomic weight of Pb element onto glass substrates at room temperature for 200 nm thickness. Effect of doping on a.c electrical properties such as, a.c conductivity, real, and imaginary parts of dielectric constant within frequency range (10 KHz - 10 MHz) are measured. The frequency dependence of a.c conductivity is matched with correlated barrier hoping especially at higher frequency. Effect of doping on behavior of a.c mechanism within temperature range 298-473 K was studied.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 01 2020
Journal Name
Journal Of Engineering
Parametric Study on Unconnected Piled Raft Foundation Using Numerical Modelling
...Show More Authors

Piled raft is commonly used as foundation for high rise buildings. The design concept of piled raft foundation is to minimize the number of piles, and to utilize the entire bearing capacity. High axial stresses are therefore, concentrated at the region of connection between the piles and raft. Recently, an alternative technique is proposed to disconnect the piles from the raft in a so called unconnected piled raft (UCPR) foundation, in which a compacted soil layer (cushion) beneath the raft, is usually introduced.  The piles of the new system are considered as reinforcement members for the subsoil rather than as structural members. In the current study, the behavior of unconnected piled rafts systems has been studie

... Show More
View Publication Preview PDF
Crossref (11)
Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Thu Jul 01 2021
Journal Name
Civil Engineering Journal
Factors Affecting Traffic Accidents Density on Selected Multilane Rural Highways
...Show More Authors

Estimations of average crash density as a function of traffic elements and characteristics can be used for making good decisions relating to planning, designing, operating, and maintaining roadway networks. This study describes the relationships between total, collision, turnover, and runover accident densities with factors such as hourly traffic flow and average spot speed on multilane rural highways in Iraq. The study is based on data collected from two sources: police stations and traffic surveys. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. Three highways are selected in Wassit governorate as a case study to cover the studied locations of the accidents. The selection

... Show More
Preview PDF
Crossref (11)
Crossref
Publication Date
Fri Jul 01 2011
Journal Name
Engineering And Technology Journal
Off-Line Arabic Signature Recognition Based on Invariant Moments Properties
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Mar 23 2020
Journal Name
Journal Of Engineering
Drag Reduction Using Passive Methods on KIA PRIDE Car Model
...Show More Authors

An experimental study on a KIA pride (SAIPA 131) car model with scale of 1:14 in the wind tunnel was made beside the real car tests. Some of the modifications to passive flow control which are (vortex generator, spoiler and slice diffuser) were added to the car to reduce the drag force which its undesirable characteristic that increase fuel consumption and exhaust toxic gases. Two types of calculations were used to determine the drag force acting on the car body. Firstly, is by the integrating the values of pressure recorded along the pressure taps (for the wind tunnel and the real car testing), secondly, is by using one component balance device (wind tunnel testing) to measure the force. The results show that, the avera

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Thu Jan 01 2009
Journal Name
Ibn Al– Haitham Journal For Pure And Applied Science
Some Results on Fibrewise Lindelöf and Locally Lindelöf Topological Spaces
...Show More Authors

In this paper we define and study new concepts of fibrewise topological spaces over B namely, fibrewise Lindelöf and locally Lindelöf topological spaces, which are generalizations of will-known concepts: Lindelöf topological space (1) "A topological space X is called a Lindelöf space if for every open cover of X has a countable subcover" and locally Lindelöf topological space (1) "A topological space X is called a locally Lindelöf space if for every point x in X, there exist a nbd U of x such that the closure of U in X is Lindelöf space". Either the new concepts are: "A fibrewise topological space X over B is called a fibrewise Lindelöf if the projection function p : X→B is Lindelöf" and "The fibrewise topological space X over B

... Show More
Preview PDF