Preferred Language
Articles
/
ijs-6894
Effect of Gamma irradiation on The Optical properties of (PVA: CuCl2) films
...Show More Authors

The study effect irradiation on optical properties of film (PVA: CuCL2) prepared by casting method, with thickness of (30±1) μm. And used Cs137 to obtained Gamma ray with energy (662)keV and time irradiation(5,6 and 7) weeks and affectivity (4.3) ci. The spectra absorbance and transmittance register in range (300-1100) nm .
Results show that the optical band gap for (PVA: CuCl2) decreasing after irradiation with gamma ray from (3.2,3.1,3 and 2.7)eV, urbach energy values increase with the increasing time radiation. And the absorption constants (α,k,n,) and the optical conductivity are changing after irradiated with gamma ray .

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
The Educational Ideology of John Dewey
...Show More Authors

The Educational Ideology of John Dewey

View Publication Preview PDF
Publication Date
Sat Jun 15 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Evaluation of EDI Software Application
...Show More Authors

The primary objective of this research is to determine the best EDI
software application that meets the users' requirements, and to show
the functionality potentially presented in any software of electronic
data interchange (EDI) system. Also, in this paper, will be addressed
issues relating to integration EDI system into business process, and
the issues regarding the performance of EDI application will also be
discussed

View Publication Preview PDF
Publication Date
Mon Feb 14 2022
Journal Name
Proceedings Of The National Academy Of Sciences
Pharmaceutical pollution of the world’s rivers
...Show More Authors

Environmental exposure to active pharmaceutical ingredients (APIs) can have negative effects on the health of ecosystems and humans. While numerous studies have monitored APIs in rivers, these employ different analytical methods, measure different APIs, and have ignored many of the countries of the world. This makes it difficult to quantify the scale of the problem from a global perspective. Furthermore, comparison of the existing data, generated for different studies/regions/continents, is challenging due to the vast differences between the analytical methodologies employed. Here, we present a global-scale study of API pollution in 258 of the world’s rivers, representing the environmental influence of 471.4 million people across

... Show More
View Publication
Scopus (636)
Crossref (624)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Arpn Journal Of Engineering And Applied Sciences
SURVEY ON VANET TECHNOLOGIES AND SIMULATION MODELS
...Show More Authors

Vehicular ad hoc network (VANET) is a distinctive form of Mobile Ad hoc Network (MANET) that has attracted increasing research attention recently. The purpose of this study is to comprehensively investigate the elements constituting a VANET system and to address several challenges that have to be overcome to enable a reliable wireless communications within a vehicular environment. Furthermore, the study undertakes a survey of the taxonomy of existing VANET routing protocols, with particular emphasis on the strengths and limitations of these protocols in order to help solve VANET routing issues. Moreover, as mobile users demand constant network access regardless of their location, this study seeks to evaluate various mobility models for vehi

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
International Conference Of Computational Methods In Sciences And Engineering Iccmse 2021
On Čech fuzzy soft bi-clouser spaces
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Mar 01 2011
Journal Name
Journal Of Economic And Administrative Science
On Shrinkage Estimation for Generalized Exponential Distribution
...Show More Authors

Preview PDF
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Agricultural And Statistical Sciences
ON ERROR DISTRIBUTION WITH SINGLE INDEX MODEL
...Show More Authors

In this paper, the error distribution function is estimated for the single index model by the empirical distribution function and the kernel distribution function. Refined minimum average variance estimation (RMAVE) method is used for estimating single index model. We use simulation experiments to compare the two estimation methods for error distribution function with different sample sizes, the results show that the kernel distribution function is better than the empirical distribution function.

Scopus
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Tue Dec 24 2024
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication