Preferred Language
Articles
/
vBZ3s4oBVTCNdQwCq6NQ
On Large-Small submodule and Large-Hollow module
...Show More Authors
Abstract<p>The goal of this research is to introduce the concepts of Large-small submodule and Large-hollow module and some properties of them are considered, such that a proper submodule N of an R-module M is said to be Large-small submodule, if N + K = M where K be a submodule of M, then K is essential submodule of M ( K ≤<sub>e</sub> M ). An R-module M is called Large-hollow module if every proper submodule of M is Large-small submodule in M.</p>
Scopus Crossref
View Publication
Publication Date
Fri Jul 30 2021
Journal Name
Coatings
A Past, Present, and Prospective Review on Microwave Nondestructive Evaluation of Composite Coatings
...Show More Authors

Recent years have witnessed an increase in the use of composite coatings for numerous applications, including aerospace, aircraft, and maritime vessels. These materials owe this popularity surge to the superior strength, weight, stiffness, and electrical insulation they exhibit over conventional substances, such as metals. The growing demand for such materials is accompanied by the inevitable need for fast, accurate, and affordable nondestructive testing techniques to reveal any possible defects within the coatings or any defects under coating. However, typical nondestructive testing (NDT) techniques such as ultrasonic testing (UT), infrared thermography (IRT), eddy current testing (ECT), and laser shearography (LS) have failed to p

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
Enhancement of Digital Stereo Vision Images based on Histogram and Gamma Correction Strategy
...Show More Authors

     Image contrast enhancement methods have been a topic of interest in digital image processing for various applications like satellite imaging, recognition, medical imaging, and stereo vision. This paper studies the technique for image enhancement utilizing Adaptive Histogram Equalization and Weighted Gamma Correction to cater radiometric condition and illumination variations of stereo image pairs. In the proposed method, the stereo pair images are segmented together with weighted distribution into sub-histograms supported with Histogram Equalization (HE) mapping or gamma correction and guided filtering.  The experimental result shows the experimented techniques outperform compare with the original image in ev

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed May 26 2021
Journal Name
Energies
Rotational Piezoelectric Energy Harvesting: A Comprehensive Review on Excitation Elements, Designs, and Performances
...Show More Authors

Rotational Piezoelectric Energy Harvesting (RPZTEH) is widely used due to mechanical rotational input power availability in industrial and natural environments. This paper reviews the recent studies and research in RPZTEH based on its excitation elements and design and their influence on performance. It presents different groups for comparison according to their mechanical inputs and applications, such as fluid (air or water) movement, human motion, rotational vehicle tires, and other rotational operational principal including gears. The work emphasises the discussion of different types of excitations elements, such as mass weight, magnetic force, gravity force, centrifugal force, gears teeth, and impact force, to show their effect

... Show More
View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Science
Quantum Key Distribution and Chaos Bandwidth Effects on Impact Security of Quantum Communications
...Show More Authors

The influence of bias current on the bandwidth of chaotic signals in semiconductor lasers by optical feedback has been studied experimentally and numerically. The measured data reveal that the bandwidth increase when the system becomes chaotic and this chaotic signal has a broadband spectrum so it can be used as a carrier for the quantum key. Mixing chaotic signal and quantum key make a very small change in chaotic bandwidth that does not affect the security of data transmitted.

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Response surface methodology: A review on its applications and challenges in microbial cultures
...Show More Authors

View Publication
Scopus (159)
Crossref (113)
Scopus Clarivate Crossref
Publication Date
Sun Dec 15 2019
Journal Name
Journal Of Baghdad College Of Dentistry
Comparison between the effects of Aloe vera and chlorhexidine on clinical periodontal parameters
...Show More Authors

Background: Periodontal diseases are one of the major dental pathologies that affect human populations worldwide at high prevalence rates The term periodontal disease usually refers only to plaque related inflammatory disease of the dental supporting tissues. Mouth rinses which act as an anti-plaque agents mostly used as adjuncts to oral hygiene. Aims of the study: To Estimate and compare the effects of Aloe vera relative to chlorhexidine on the clinical periodontal parameters (plaque index, gingival index, bleeding on probing). Material and method: A total of 44 subjects with plaque-induced gingivitis, baseline of data were collected for (PLI, GI, and BOP) and underwent oral hygiene instruction, scaling and polishing, then divided into:

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Study the synergistic Effect between Nanoparticles and Spiramycin on Immunological Response Against Toxoplasmosis
...Show More Authors
Abstract<p>This investigation was carried out to estimate the antiparasitic potential of silver and Chitosan nanoparticles loaded with spiramycin against toxoplasmosis infected. After mice injected intraperitoneal in a dose 10<sup>3</sup>viable tachyzoites for acute infection; then treated with spiramycin, chitosan nanoparticles and silver nanoparticles as a single or combined therapy given for seven days. Peritoneal fluid examination revealed a significant decrease in the number of<italic>T. gondii</italic>tachyzoites in all treated infected mice compared with infected non-treated. The combined therapy presented better results than the single one. The best effect was observed in a group of </p> ... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Mathematical Biology And Neuroscience
Effects of fear and refuge strategy dependent on predator in food web dynamics
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref