Preferred Language
Articles
/
ijp-605
Immobilization of Nuclear Waste Using Carbon Nanotubes Prepared by Laser Ablation in Liquid Method
...Show More Authors

In an attempt to disposal from nuclear waste which threats our health and environments. Therefore we have to find appropriate method to immobilize nuclear waste. So, in this research the nuclear waste (Strontium hydroxide) was immobilized by Carbon nanotubes (CNTs).  The Nd-YAG laser with wave length 1064 nm, energy 750 mJ and 100 pulses used to prepare CNTs. After that adding Sr(HO)2 powder to the CNTs colloidal in calculated rate to get homogenous mixing of CNTs-Sr(OH)2. The Sr(HO)2 absorbs carbon dioxide from the air to form strontium carbonate so, the  new solution is CNTs-SrCO3. To dry solution putting three drops from the new solution on the glass slides. To investigate the radiation damage on CNTs structure, the sample was irradiation by Beta source (90Sr/90Y) for different period of time. The structure properties were measured using X-ray diffraction XRD while the shape and size property was measured by scanning electron microscope SEM.

The result shows homogenous distribution of nanoparticles with average particle size about 20nm. The XRD spectra for all sample before and after irradiation shows the higher peaks that it’s almost appearance at 2  = 25 degree and when compared the XRD phase with Standard card the resultant nanomaterial is Strontium carbonite (SrCo3). From SEM micrograph, CNTs-SrCO3 were well decorated on the surface of CNTs and there was not any remarkable difference in the corresponding due to Beta radiation exposure.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Smoothing Image using Adaptive Median Filter
...Show More Authors

Median filter is adopted to match the noise statistics of the degradation seeking good quality smoothing images. Two methods are suggested in this paper(Pentagonal-Hexagonal mask and Scan Window Mask), the study involved modified median filter for improving noise suppression, the modification is considered toward more reliable results. Modification median filter (Pentagonal-Hexagonal mask) was found gave better results (qualitatively and quantitatively ) than classical median filters and another suggested method (Scan Window Mask), but this will be on the account of the time required. But sometimes when the noise is line type the cross 3x3 filter preferred to another one Pentagonal-Hexagonal with few variation. Scan Window Mask gave bett

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2009
Journal Name
Al-khwarizmi Engineering Journal
Image Zooming Using Inverse Slantlet Transform
...Show More Authors

Digital image is widely used in computer applications. This paper introduces a proposed method of image zooming based upon inverse slantlet transform and image scaling. Slantlet transform (SLT) is based on the principle of designing different filters for different scales.

      First we apply SLT on color image, the idea of transform color image into slant, where large coefficients are mainly the   signal and smaller one represent the noise. By suitably modifying these coefficients , using scaling up image by  box and Bartlett filters so that the image scales up to 2X2 and then inverse slantlet transform from modifying coefficients using to the reconstructed image .

  &nbs

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 27 2023
Journal Name
Tem Journal
Predicting Age and Gender Using AlexNet
...Show More Authors

Due to the availability of technology stemming from in-depth research in this sector and the drawbacks of other identifying methods, biometrics has drawn maximum attention and established itself as the most reliable alternative for recognition in recent years. Efforts are still being made to develop a user-friendly system that is up to par with security-system requirements and yields more reliable outcomes while safeguarding assets and ensuring privacy. Human age estimation and Gender identification are both challenging endeavours. Biomarkers and methods for determining biological age and gender have been extensively researched, and each has advantages and disadvantages. Facial-image-based positioning is crucial for many application

... Show More
View Publication
Scopus (10)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 03 2024
Journal Name
The Science Teacher
Using Scenarios to Assess Student Learning
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
Image Hiding Using Discrete Cosine Transform
...Show More Authors

Steganography is a mean of hiding information within a more obvious form of
communication. It exploits the use of host data to hide a piece of information in such a way
that it is imperceptible to human observer. The major goals of effective Steganography are
High Embedding Capacity, Imperceptibility and Robustness. This paper introduces a scheme
for hiding secret images that could be as much as 25% of the host image data. The proposed
algorithm uses orthogonal discrete cosine transform for host image. A scaling factor (a) in
frequency domain controls the quality of the stego images. Experimented results of secret
image recovery after applying JPEG coding to the stego-images are included.

View Publication Preview PDF
Publication Date
Mon Jan 02 2012
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Image encryption technique using Lagrange interpolation
...Show More Authors

Publication Date
Thu Dec 01 2011
Journal Name
Journal Of Engineering
Image Reconstruction Using Modified Hybrid Transform
...Show More Authors

In this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.

View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel cryptosystem using integer power
...Show More Authors

Various methods are utilized providing complexity for cryptosystem with the aim to increase the security and avoiding hacker attack. Hybrid cryptosystem is one of these cryptosystems which is used two types of cryptosystems and has many applications in data transmitted. This research, proposed a novel method that used power exponent instead of using the prime number directly and also providing complexity of asymmetric cryptosystems. This method has been applied theoretically in two public systems RSA and EL-Gamal. Power RSA and Power EL-Gamal are modified asymmetric cryptosystems, in which the power number is kept by the sender and the receiver. Moreover, we use group theory to prove that these cryptosystems work properly. Our exten

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Technologies And Materials For Renewable Energy, Environment, And Sustainability: Tmrees23fr
Hyperspectral pansharpening improvement using MNF transformation
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Using Rational Judgment Strategy in Teaching Science on the Developing of Scientific Thinking at the Male Students of Intermediate Second Grade
...Show More Authors

The study aimed to explore the effectiveness of using rational judgment strategy in teaching science to develop scientific thinking for second-grade students. The researcher utilized the quasi-experimental approach based on (the pre/post designing) of two groups: experimental and control. As for tools: a test of scientific thinking prepared by the researcher that proved its verification of their validity and reliability. The test applied on a random sample of (66) students, divided into two groups: (34) experimental, and (32) control. The results showed that the experimental group outperformed the control group in the post-application of the scientific thinking test, In each skill separately, and in the total skills. The study recommende

... Show More
View Publication Preview PDF