Preferred Language
Articles
/
rhc2WZABVTCNdQwCsIeN
How geometric reverse engineering techniques can conserve our heritage; a case study in Iraq using 3D laser scanning
...Show More Authors
Abstract<p>Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of artefacts in virtual restoration is presented based on reverse engineering techniques. Two case studies were selected and processed in Iraq to meet the aim of this research and show how reverse engineering approaches can save our culture. The efficiency and safety of the preservation and restoration of cultural relics are improved and visually demonstrated. Different reverse engineering techniques applied to show the geometric potential for such approaches following laser-based 3D data application.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Dynamics of a single Condensing Two-Phase Bubble
...Show More Authors

The dynamics of a single condensing two-phase bubble of two different dispersed-continuous systems were studied. The systems were, CCl4 - water and CCl4 - 100% glycerol. Cinephotography was used to determine the change in height, diameter and time. These results were used to determine the experimental rise velocity of the bubble, which was compared with a theoretical one based on some equations used. It was found that the velocity of the first system remained almost constant, while it decreased gradually for the second system.

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Route Educational And Social Science Journal
A POSTMODERNIST READING OF KURT VONNEGUT’S SLAUGHTERHOUSE-FIVE
...Show More Authors

View Publication
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Advances In Science And Technology Research Journal
Vein Biometric Recognition Methods and Systems: A Review
...Show More Authors

View Publication
Scopus (16)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Italian Journal Of Pure And Applied Mathematics
The non-zero divisor graph of a ring
...Show More Authors

Scopus (7)
Scopus
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Wearable Detection Systems for Epileptic Seizure: A review
...Show More Authors

The seizure epilepsy is risky because it happens randomly and leads to death in some cases. The standard epileptic seizures monitoring system involves video/EEG (electro-encephalography), which bothers the patient, as EEG electrodes are attached to the patient’s head.

Seriously, helping or alerting the patient before the seizure is one of the issue that attracts the researchers and designers attention. So that there are spectrums of portable seizure detection systems available in markets which are based on non-EEG signal.

The aim of this article is to provide a literature survey for the latest articles that cover many issues in the field of designing portable real-time seizure detection that includes the use of multiple

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 01 2015
Journal Name
Journal Of Engineering
Vibration Analysis of a Composite Plate with Delamination
...Show More Authors

The use of composite materials has vastly increased in recent years. Great interest is therefore developed in the damage detection of composites using non- destructive test methods. Several approaches have been applied to obtain information about the existence and location of the faults. This paper used the vibration response of a composite plate to detect and localize delamination defect based on the modal analysis. Experiments are conducted to validate the developed model. A two-dimensional finite element model for multi-layered composites with internal delamination is established. FEM program are built for plates under different boundary conditions. Natural frequencies and modal displacements of the intact and damaged

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 31 2021
Journal Name
Research Journal Of Pharmacy And Technology
A Review on Film Forming Drug Delivery Systems
...Show More Authors

Conventional dosage forms for topical and transdermal drug delivery have several disadvantages related mainly to its poor skin permeation and patient compliance. Many approaches have been developed to improve these dosage forms. Film forming drug delivery systems represents a recent advancement in this field. It provides improved patient compliance with enhanced skin permeation of drugs. In its simplest form, these consist of a polymeric solution, usually in a supersaturated state, in a suitable solvent. A plasticizer is usually added to improve the flexibility and enhance the tensile strength to the film. It is also possible to control and sustain the drug release from the films by controlling the polymeric content, concentration o

... Show More
View Publication
Scopus (3)
Crossref (4)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
College Of Islamic Sciences
Historical development of Islamic jurisprudence - Develop a model
...Show More Authors

 

       Praise be to God, and prayers and peace be upon our master Muhammad, the Messenger of God, and upon his family, companions, and those who are guided by his guidance.

Then:

       Our Islamic jurisprudence and its basic principles are fixed, namely: the Noble Qur’an, then the Prophet’s Sunnah, then consensus, then analogy. However, it is characteristic of what makes it developed to meet the requirements of renewed life, including: sent interests, custom, approval, blocking pretexts, changing times. That is why it went through different stages, growth, brilliance, stagnation and endowment; Therefore, many scholars of Islamic jurisprudence divided its stages into four sections: the stage of inf

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Microprocessors And Microsystems
Design considerations for a microprocessor-based Doppler radar
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref