Preferred Language
Articles
/
joe-2061
Traveling Wave Cylindrical Induction Heating System
...Show More Authors

The paper deals with the traveling wave cylindrical heating systems. The analysis presented is analytical and a multi-layer model using cylindrical geometry is used to obtain the theoretical results. To validate the theoretical results, a practical model is constructed, tested and the results are compared with the theoretical ones. Comparison showed that the adopted analytical method is efficient in describing the performance of such induction heating systems.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
design Electronic cost accounting system for the Iraqi Airways Company
...Show More Authors

The research Was based to on a real problem and realistically of represented by that  Iraqi Airways company does not have the electronic cost accounting system and therefore  be the process of  the pricing various services provided by a company sample research respecting  air transport and air cargo and aviation fuel and services and catering are not properly especially in the presence of new data from the new companies entering competition in Iraqi aviation industry and therefore does not provide price flexibility in order to compete in getting market share, And then research this problem addressed through design an electronic cost Accounting system covers all the costs incurred by the compan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (7)
Scopus Crossref
Publication Date
Thu Nov 08 2018
Journal Name
Iraqi National Journal Of Nursing Specialties
Evaluation of School Health Surveillance System characteristics in Baghdad Governorate
...Show More Authors

Objectives: Evaluation of school health surveillance system with Indicate the level of usefulness of this system,
in addition to Describe the system.
Methodology: A probability multistage sample of (54) subjects which is selected the school health units from
the health institutions. Questionnaire has been divided into three main parts consist, form(A) especially for
health directorate, form (B) for health sectors, and form (C) for primary health care centers; each form contains
the basic components, structure, process, outcome, total items of questionnaire was ( 74) items.
Results: The study results indicate that the system is average adequacy, simple, moderately flexible, highly
acceptance, representative, low utili

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 27 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Evaluation of Meloxicam Microsponges as Transdermal Delivery System
...Show More Authors

The aim of present study was to develop gel formulation of microsponges of poorly soluble drug meloxicam (MLX) in order to enhance the release and dissolution of MLX which is the limitation for preparation in topical forms. Also skin delivery is an alternative administration for MLX that can minimize gastrointestinal (GI) side effects and improve patient compliance. The microsponges of MLX were prepared by quasi-emulsion solvent diffusion method.  The effects of drug:polymer ratio, stirring time and Eudragit polymer type on the physical characteristics of microsponges were investigated and characterized for production yield, loading efficiency, particle size, surface morphology, and in vitro drug release from microsponges. The selec

... Show More
View Publication
Crossref (7)
Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 02 2014
Journal Name
Iraqi Journal Of Pharmaceutical Science
preparation and evaluation of meloxicam microsponges as transdermal delivery system
...Show More Authors

Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Orphans and Families of Martyrs of Terrorism Expert System-OFMTES
...Show More Authors

The increasing number of orphans and their organizations and institutes in our community makes it increasingly important to design and develop an expert system that supports decisions concerning orphans and their families. This system can be used by any orphans organization to facilitate its work.
The proposed work is designed to manage the Orphans and Families of Martyrs of Terrorism Expert System (OFMTES) by registry all information about all orphans to display mostly orphan deserves bill, data is entered for each orphan, and with each entry a counter is increased according to this input information; the output result represents the score for that orphan. Different orphans have different scores. Coloring is used to know the degree o

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
International Journal Of Mechanical Engineering
Improving the Performance of the Vehicle Suspension System Using Inerter
...Show More Authors

Preview PDF