Preferred Language
Articles
/
jih-1404
Effect Of Solvent Types On Photo Induced Electron Transfer in Methylene Blue dye MB+-- Benzophenone Ketone (ABP) System..
...Show More Authors

Th   r:ats for the photo induced eleytr-on tra;nsfer reactions in the

Methylen-e blue 'l'vffi+ ·dye· with benzo_phenone (ABP) ketone in variety

solvc;:nts al n:loin tempemtme ha;ve qn calculated . Electron trans_ fer

-rates are large in• }stt:on;gly--'{:'lolaf- solvent and week in-l s.s :polar solvent.

the high values o:E   t±te r.tes a_f electro-n  tr;ans-fer indicate that tite dye

triplet i$ mqre, r activ.e toWard ABP ket-one.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Sat Oct 01 2016
Journal Name
World Journal Of Pharmaceutical Research
TERATOGENIC EFFECT OF METHOTREXATE ON HISTOGENESIS OF TESTIS IN NEWBORN RAT
...Show More Authors

Background: Methotrexate (MTX) was one of the first drugs synthesized for a specific chemotherapeutic purpose used to inhibit folic acid (FA) for the treatment of acute lymphoblastic leukemia in children. Its history is closely related to the discovery and characterization of folic acid. It is used clinically in medicine to treat a range of cancerous and noncancerous conditions. MTX is currently used in gynecology to treat disorders arising from trophoblastic tissue, namely, ectopic pregnancy. MTX, the most frequently used diseasemodifying anti-rheumatic drug (DMARD), suppresses disease activity and reduces joint damage. The aim of study: It is designed to demonstrate the effect of MTX (7.5 mg/wk.) on the histogenesis of gonad (testis) of n

... Show More
Publication Date
Tue Mar 14 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Role of Broccoli ( Brassica oleracea ) in Treatment For Induced Polycystic ovary syndrome in Albino rats ( Rattus norvegicus )
...Show More Authors

The goal of present study was to investigate the benefits of broccoli (as antiandrogenic plant) in protection and treatment for reproductive hormonal and metabolic disturbance, which combined with polycystic ovarian syndrome (PCOS). The PCOS model was introduced by injecting subcutaneously prepubertal female rats at 21 days old with Letrozole for 39 days, and divided into 6 groups (8 rats each ) as follows:

Group 1: Female rats were injected with 0.1 ml of normal saline. Group 2: Female rats were injected with 0.1 ml of 400 µg Letrozole Group 3: Female rats were injected with 0.1 ml of 400 µg L with orally gavaged of broccoli juice. Group 4: Female rats were injected with 0.1 ml of normal saline and at the end of the last

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering
Implementation of Power System Stabilizer Based on Conventional and Fuzzy Logic Controllers
...Show More Authors

To damp the low-frequency oscillations which occurred due to the disturbances in the electrical power system, the generators are equipped with Power System Stabilizer (PSS) that provide supplementary feedback stabilizing signals. The low-frequency oscillations in power system are classified as local mode oscillations, intra-area mode oscillation, and interarea mode oscillations. A suitable PSS model was selected considering the low frequencies oscillation in the inter-area mode based on conventional PSS and Fuzzy Logic Controller. Two types of (FIS) Mamdani and suggeno were considered in this paper. The software of the methods was executed using MATLAB R2015a package.

 

 

View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Diyala Journal Of Engineering Sciences
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Fme Transactions
Development of automated liquid filling system based on the interactive design approach
...Show More Authors

The automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve

... Show More
View Publication
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref