Preferred Language
Articles
/
sBcft40BVTCNdQwCFRlu
Actor performance features in the types of theatrical silent
...Show More Authors

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jun 15 2022
Journal Name
Malaysian Journal Of Science
STUDY THE RELATIONSHIP BETWEEN BREMSSTRAHLUNG DOSE RATE AND THE ENERGY OF BETA RAY FOR DIFFERENT TYPES OF SHIELD
...Show More Authors

The dose rate for bremsstrahlung radiation from beta particles with energy (1.710) MeV and (2.28) MeV which comes from (32P and 90Y) beta source respectively have been calculated through six materials (polyethylene, wood, aluminum, iron, tungsten and lead) for first shielding material with thickness (x=1) mm which are putting between beta sources and second shield (polyethylene, aluminum and lead) with thickness (1, 2 &4) mm have been calculated. The distance between beta source and second shield is constant (D=1) cm. This dose rate was found by program called Rad Pro Calculator (version 3.26). The results of dose rate of beta particles were plotted as a function to the atomic number (Z) for first shield materials for each

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Jun 15 2022
Journal Name
Malaysian Journal Of Science
STUDY THE RELATIONSHIP BETWEEN BREMSSTRAHLUNG DOSE RATE AND THE ENERGY OF BETA RAY FOR DIFFERENT TYPES OF SHIELD
...Show More Authors

The dose rate for bremsstrahlung radiation from beta particles with energy (1.710) MeV and (2.28) MeV which comes from (32P and 90Y) beta source respectively have been calculated through six materials (polyethylene, wood, aluminum, iron, tungsten and lead) for first shielding material with thickness (x=1) mm which are putting between beta sources and second shield (polyethylene, aluminum and lead) with thickness (1, 2 &4) mm have been calculated. The distance between beta source and second shield is constant (D=1) cm. This dose rate was found by program called Rad Pro Calculator (version 3.26). The results of dose rate of beta particles were plotted as a function to the atomic number (Z) for first shield materials for each

... Show More
Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Boundary & Geometric Region Features Image Segmentation for Quadtree Partitioning Scheme
...Show More Authors

In this paper, an efficient image segmentation scheme is proposed of boundary based & geometric region features as an alternative way of utilizing statistical base only. The test results vary according to partitioning control parameters values and image details or characteristics, with preserving the segmented image edges.

Publication Date
Mon Aug 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
Dorsal hand veins features extraction and recognition by correlation coefficient
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 18 2023
Journal Name
Journal Of Current Researches On Social Sciences
A Study on Sociocultural Features among Turkish and Iraqi Women
...Show More Authors

SM ADAI, BN RASHID, Journal of Current Researches on Social Sciences, 2023

View Publication
Publication Date
Fri Apr 02 2021
Journal Name
New Trends In Information And Communications Technology Applications: 4th International Conference, Ntict 2020, Baghdad, Iraq, June 15, 2020, Proceedings 4
Iris recognition using localized Zernike features with partial iris pattern
...Show More Authors

Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Thu Feb 24 2022
Journal Name
Journal Of Educational And Psychological Researches
Question Asking Skills: Levels, Conditions, Classification, and Types
...Show More Authors

The research aims to know the question asking skills in terms of levels, conditions, classification, and types. The research limited to the literature that dealt with the importance of questioning for students and teachers. The most important term used in the research is the skill (Ryan defined it as "the ability to perform with great efficiency, accuracy, and ease). The results of the research are as follows: 1. the questions asked by the schoolteacher within the assessment of students' learning. 2. Teachers should focus on the lower levels of learning (remembering, understanding and comprehension) and then evaluating students at the higher levels (synthesis and evaluation). 3. Teacher with good knowledge can skillfully use the question

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 04 2014
Journal Name
International Journal Of Advanced Computing
User Authentication Approach using a Combination of Unigraph and Digraph Keystroke Features
...Show More Authors

In Computer-based applications, there is a need for simple, low-cost devices for user authentication. Biometric authentication methods namely keystroke dynamics are being increasingly used to strengthen the commonly knowledge based method (example a password) effectively and cheaply for many types of applications. Due to the semi-independent nature of the typing behavior it is difficult to masquerade, making it useful as a biometric. In this paper, C4.5 approach is used to classify user as authenticated user or impostor by combining unigraph features (namely Dwell time (DT) and flight time (FT)) and digraph features (namely Up-Up Time (UUT) and Down-Down Time (DDT)). The results show that DT enhances the performance of digraph features by i

... Show More