Preferred Language
Articles
/
mhbvjosBVTCNdQwC5c1B
Electrical and Structural Properties of CuBa2LaCa2Cu4O11+δ Superconducting System
...Show More Authors

In this work, the superconducting CuBa2LaCa2Cu4O11+δ compound was prepared by citrate precursor method and the electrical and structural properties were studied. The electrical resistivity has been measured using four probe test to find the critical temperature Tc(offset) and Tc(onset). It was found that Tc (offset) at zero resistivity has 101 K and Tc (onset) has 116 K. The X-ray diffraction (XRD) analysis exhibited that a prepared compound has a tetragonal structure. The crystal size and microscopic strain due to lattice deformation of CuBa2LaCa2Cu4O11+δ were estimated by four methods, namely Scherer(S), Halder-Wagner(H-W), size-strain plot (SSP) and Williamson-Hall, (W-H) methods. Results of crystal sizes obtained by these methods were compared with each other. In all these methods, the values of βhkl (full-width half-maximum (FWHM) for diffraction peaks) and miler indices (hkl) are determined from the results obtained from Fullprof, Mach, Origin and VESTA software. The lattice parameters a, b and c, lattice shape, d and degree of crystallization were calculated. It was found that the crystal size which are calculating by S, W-H, SSP and H-W were (174.8472, 171.1776, 173.1009 and 175.4386) A0 respectively while the lattice strain values were (none, 0.0025, 0.004 and 0.003464), respectively.

Scopus Crossref
View Publication
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Wasit Journal Of Computer And Mathematics Science
Real time handwriting recognition system using CNN algorithms
...Show More Authors

Abstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition

... Show More
View Publication
Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for Facial Image Detection System
...Show More Authors

     Face detection systems are based on the assumption that each individual has a unique face structure and that computerized face matching is possible using facial symmetry. Face recognition technology has been employed for security purposes in many organizations and businesses throughout the world. This research examines the classifications in machine learning approaches using feature extraction for the facial image detection system. Due to its high level of accuracy and speed, the Viola-Jones method is utilized for facial detection using the MUCT database. The LDA feature extraction method is applied as an input to three algorithms of machine learning approaches, which are the J48, OneR, and JRip classifiers.  The experiment’s

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Public budget System repair Targets Prepared Public Budget
...Show More Authors

Require senior management of the state when developing the strategy the general budget to the clarity of the reasons that are based upon the ministries in the preparation of estimates of expenditure for the next year to justify the spending, and in the absence of targets, the ministry or government unit would not be in front, but be guided by the size of expenditure for the last year in addition to the percentage of represented an increase of appropriations required for the next year in light of the fiscal policy of the state, so the requested increase in appropriations to meet the desired increase in some of its activities and to meet the increase in salaries and prices. So must be available to the Ministry of criteria that coul

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 13 2021
Journal Name
Iraqi Journal Of Science
IRAQI Academic Admission System: A Performance Analysis Evaluation
...Show More Authors

The service quality of any information-based system could be evaluated by the high-end user in such a way that the system developer or responsible intently might use these user experiences to improve, develop and benchmark their system. In this paper, questionnaire implemented to rate to what extent the academic admission system as a web site achieves performance. Data were collected from 21 users of the system; all of them are highly educated and have the experience of using the site. Quadrant and gap analysis were implemented to evaluate the weakness and strength of the data. The major data analyses were performed on the data collected in terms of its importance and satisfaction to the users. A number of statistical tools have been uti

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
On The Queuing System M/Er/1/N
...Show More Authors

In this paper the queuing system (M/Er/1/N) has been considered in equilibrium. The method of stages introduced by Erlang has been used. The system of equations which governs the equilibrium probabilities of various stages has been given. For general N the probability of j stages of service are left in the system, has been introduced. And the probability for the empty system has been calculated in the explicit form.

View Publication Preview PDF
Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Proposed Hybrid Sparse Adaptive Algorithms for System Identification
...Show More Authors

Abstract 

For sparse system identification,recent suggested algorithms are  -norm Least Mean Square (  -LMS), Zero-Attracting LMS (ZA-LMS), Reweighted Zero-Attracting LMS (RZA-LMS), and p-norm LMS (p-LMS) algorithms, that have modified the cost function of the conventional LMS algorithm by adding a constraint of coefficients sparsity. And so, the proposed algorithms are named  -ZA-LMS, 

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Jan 27 2020
Journal Name
Iraqi Journal Of Science
Software Development for First Aid Decision Support System
...Show More Authors

This work presents an approach to deal with modelling a decision support system framework to introduce an application for decisions in medical knowledge system analysis. First aid is extremely important worldwide and, hence, a decision support framework, know as First Aid Decision Support System (FADSS), was designed and implemented to access experimental cases exerting danger to the general population, offering advanced conditions for testing abilities in research and arranging an emergency treatment through the graphical user interface (UI). The design of first aid treatment in FADSS depends on the general cases in first aid. We presented a strategy to manage first aid treatment  by modelling an application (FADSS) that assists pe

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref