In this study the Fourier Transform Infrared Spectrophotometry (FTIR) provides a quick, efficient and relatively inexpensive method for identifying and quantifying gypsum concentrations in the samples taken from different sites from different localities from Alexandria district southwest Baghdad. A comprehensive spectroscopic study of gypsum-calcite system was reported to give good results for the first time by using IR for analytical grades of gypsum (CaSO4.2H2O) and calcite (CaCO3) pure crystals. The spectral results were used to create a calibration curve relates the two minerals concentrations to the intensity (peaks) of FTIR absorbance and applies this calibration to specify gypsum and calcite concentrations in Iraqi gypsiferous soil samples, which were collected from different quarries at Alexandria district-Babylon Governorate , southwest of Baghdad city. The peaks were assigned to the fundamental vibrational modes of (SO4)-2 in gypsum and (CO3)-2 in calcite. Thus FTIR appears to provide fast and reliable method for identifying gypsum and calcite concentrations in the gypsiferous soils or any sediments or rocks that have different concentrations of these two minerals.
The Elliptic Curve Cryptography (ECC) algorithm meets the requirements for multimedia encryption since the encipher operation of the ECC algorithm is applied at points only and that offer significant computational advantages. The encoding/decoding operations for converting the text message into points on the curve and vice versa are not always considered a simple process. In this paper, a new mapping method has been investigated for converting the text message into a point on the curve or point to a text message in an efficient and secure manner; it depends on the repeated values in coordinate to establish a lookup table for encoding/ decoding operations. The proposed method for mapping process is&
... Show MoreAn idea of a colored glaze is presented in this study to hide and dispose all the obstacles of using solar systems as facades integrated with buildings. This aim is achieved by designing multilayer optical interference filters by using Mat lab program . Appropriate dielectric materials, namely NdF3 of high refractive index (nH =1.6) and ThF4 of low refractive index (nL =1.5143) were employed. Quarter wave thicknesses of high (H) and low (L) refractive index were deposited on a microscopic slide substrate with n=1.513 and 550 nm design wavelength (l°). Two optical models were designed, which are Air//HL//glass and Air//LH//glass, for even numbers of layers (2-32 lay
... Show MoreTested effective Alttafaria some materials used for different purposes, system a bacterial mutagenesis component of three bacterial isolates belonging to different races and materials tested included drug Briaktin
This article aims to provide a bibliometric analysis of intellectual capital research published in the Scopus database from 1956 to 2020 to trace the development of scientific activities that can pave the way for future studies by shedding light on the gaps in the field. The analysis focuses on 638 intellectual capital-related papers published in the Scopus database over 60 years, drawing upon a bibliometric analysis using VOSviewer. This paper highlights the mainstream of the current research in the intellectual capital field, based on the Scopus database, by presenting a detailed bibliometric analysis of the trend and development of intellectual capital research in the past six decades, including journals, authors, countries, inst
... Show MoreThis paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.
The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security. This study aims to design an SDR transceiver was built using one type of modulation, which is 16 QAM, and adding a security subsystem using one type of chaos map, which is a logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and EXCLUSIVE OR with the originally transmitted data to protect data through the transmission. At th
... Show MoreThis research aims to numerically solve a nonlinear initial value problem presented as a system of ordinary differential equations. Our focus is on epidemiological systems in particular. The accurate numerical method that is the Runge-Kutta method of order four has been used to solve this problem that is represented in the epidemic model. The COVID-19 mathematical epidemic model in Iraq from 2020 to the next years is the application under study. Finally, the results obtained for the COVID-19 model have been discussed tabular and graphically. The spread of the COVID-19 pandemic can be observed via the behavior of the different stages of the model that approximates the behavior of actual the COVID-19 epidemic in Iraq. In our study, the COV
... Show MoreNumeral recognition is considered an essential preliminary step for optical character recognition, document understanding, and others. Although several handwritten numeral recognition algorithms have been proposed so far, achieving adequate recognition accuracy and execution time remain challenging to date. In particular, recognition accuracy depends on the features extraction mechanism. As such, a fast and robust numeral recognition method is essential, which meets the desired accuracy by extracting the features efficiently while maintaining fast implementation time. Furthermore, to date most of the existing studies are focused on evaluating their methods based on clean environments, thus limiting understanding of their potential a
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show More