Preferred Language
Articles
/
tBca1I4BVTCNdQwCv1gL
High-performance (K,Na)NbO3-based binary lead-free piezoelectric ceramics modified with acceptor metal oxide
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (15)
Crossref (7)
Scopus Crossref
Publication Date
Fri Feb 09 2001
Journal Name
Molecular Crystals And Liquid Crysta
Synthesis and characterization of symmetrical liquid crystalline compounds based on oxazole and thaizole rings
...Show More Authors

Twelve compounds containing a sulphur- or oxygen-based heterocyclic core, 1,3- oxazole or 1,3-thiazole ring with hydroxy, methoxy and methyl terminal substituent, were synthesized and characterized. The molecular structures of these compounds were performed by elemental analysis and different spectroscopic tequniques. The liquid crystalline behaviors were studied by using hot-stage optical polarizing microscopy and differential scanning calorimetry. All compounds of 1,4- disubstituted benzene core with oxazole ring display liquid crystalline smectic A (SmA) mesophase. The compounds of 1,3- and 1,4-disubstituted benzene core with thiazole ring exhibit exclusively enantiotropic nematic liquid crystal phases.

Scopus (9)
Scopus
Publication Date
Sun Dec 28 2025
Journal Name
مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا
From Algorithms to Applications: A Review of AI-Based Face Recognition and Identity Verification
...Show More Authors

Face recognition and identity verification are now critical components of current security and verification technology. The main objective of this review is to identify the most important deep learning techniques that have contributed to the improvement in the accuracy and reliability of facial recognition systems, as well as highlighting existing problems and potential future research areas. An extensive literature review was conducted with the assistance of leading scientific databases such as IEEE Xplore, ScienceDirect, and SpringerLink and covered studies from the period 2015 to 2024. The studies of interest were related to the application of deep neural networks, i.e., CNN, Siamese, and Transformer-based models, in face recogni

... Show More
View Publication
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
PSS/E based placement wind/PV hybrid system to improve stability of Iraqi grid
...Show More Authors

<span lang="EN-US">Proper employment of Hybrid Wind/ PV system is often implemented near the load, and it is linked with the grid to study dynamic stability analysis. Generally, instability is because of sudden load demand variant and variant in renewable sources generation. As well as, weather variation creates several factors that affect the operation of the integrated hybrid system. So this paper introduces output result of a PV /wind via power electronic technique; DC chopper; that is linked to Iraqi power system to promote the facilitating achievement of Wind/ PV voltage. Moreover, PSS/E is used to study dynamic power stability for hybrid system which is attached to an effective region of Iraqi Network. The hybrid system

... Show More
View Publication
Scopus (15)
Crossref (4)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Optical Fiber Technology
Highly sensitive fiber Bragg grating based gas sensor integrating polyaniline nanofiber for remote monitoring
...Show More Authors

View Publication
Scopus (10)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Effect Of Technology Based Learning As A Supplement To Traditional Technology On Student's Achievement
...Show More Authors

This paper describes a practical study on the impact of learning's partners, Bluetooth Broadcasting system, interactive board, Real – time response system, notepad, free internet access, computer based examination, and interaction classroom, etc, had on undergraduate student performance, achievement and involving with lectures. The goal of this study is to test the hypothesis that the use of such learning techniques, tools, and strategies to improve student learning especially among the poorest performing students. Also, it gives some kind of practical comparison between the traditional way and interactive way of learning in terms of lectures time, number of tests, types of tests, student's scores, and student's involving with lectures

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Nov 05 2022
Journal Name
Sensors
Enhancement of the CAST Block Algorithm Based on Novel S-Box for Image Encryption
...Show More Authors

Background and Aim: due to the rapid growth of data communication and multimedia system applications, security becomes a critical issue in the communication and storage of images. This study aims to improve encryption and decryption for various types of images by decreasing time consumption and strengthening security. Methodology: An algorithm is proposed for encrypting images based on the Carlisle Adams and Stafford Tavares CAST block cipher algorithm with 3D and 2D logistic maps. A chaotic function that increases the randomness in the encrypted data and images, thereby breaking the relation sequence through the encryption procedure, is introduced. The time is decreased by using three secure and private S-Boxes rather than using si

... Show More
View Publication
Crossref (18)
Crossref