Preferred Language
Articles
/
vBdUPo4BVTCNdQwCGD47
Secure QR-Code Generation in Healthcare
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Wed Jan 15 2020
Journal Name
Iraqi Journal Of Laser
Optimizing the Secure Key Rate of a Single Sequential Quantum Repeater with Two Different Quantum Memories
...Show More Authors

Quantum channels enable the achievement of communication tasks inaccessible to their
classical counterparts. The most famous example is the distribution of secret keys. Unfortunately, the rate
of generation of the secret key by direct transmission is fundamentally limited by the distance. This limit
can be overcome by the implementation of a quantum repeater. In order to boost the performance of the
repeater, a quantum repeater based on cut-off with two different types of quantum memories is suggestd,
which reduces the effect of decoherence during the storage of a quantum state.

View Publication Preview PDF
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Wed Oct 01 2008
Journal Name
2008 First International Conference On Distributed Framework And Applications
A strategy for Grid based t-way test data generation
...Show More Authors

View Publication
Scopus (22)
Crossref (16)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
GENERATION AND TOOTH CONTACT ANALYSIS (TCA) OF HYPOID GEAR DRIVE
...Show More Authors

The present work covers the Face-Hobbing method for generation and simulation of meshing of Face hobbed hypoid gear drive. In this work the generation process of hobbed hypoid gear has been achieved by determination of the generation function of blade cutter. The teeth surfaces have been drawn depending on the simulation of the cutting process and the head cutter motion. Tooth contact analysis (TCA) of such gear drive is presented to evaluate analytically the transmission error function for concave and convex tooth side due to misalignment errors. TCA results show that the gear is very sensitive to misalignment errors and
the increasing of the gear teeth number decrease the transmission error for both concave and convex tooth sides a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 01 2010
Journal Name
International Journal Of Advanced Intelligence Paradigms
Assessing IRPS as an efficient pairwise test data generation strategy
...Show More Authors

View Publication
Scopus (10)
Crossref (9)
Scopus Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Tue Jan 01 2008
Journal Name
Lecture Notes In Computer Science
IRPS – An Efficient Test Data Generation Strategy for Pairwise Testing
...Show More Authors

View Publication
Scopus (20)
Crossref (7)
Scopus Crossref
Publication Date
Fri Dec 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Energy Generation from Static Water Head Developed By Forward Osmosis
...Show More Authors

In this work, the possibility of utilizing osmosis phenomenon to produce energy as a type of the renewable energy using Thin Film Composite Ultra Low Pressure membrane TFC-ULP was studied. Where by forward osmosis water passes through the membrane toward the concentrated brine solution, this will lead to raise the head of the high brine solution. This developed static head may be used to produce energy. The aim of the present work is to study the static head developed and the flux on the high brine water solution side when using forward and reverse osmosis membranes for an initial concentration range from 35-300 g/l for each type of membrane used at room temperature and pressure conditions, and finally calculating the maximum possible po

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Brackish Water Desalination Coupled With Wastewater Treatment and Electricity Generation
...Show More Authors

A new bio-electrochemical system was proposed for simultaneous removal of organic matters and salinity from actual domestic wastewater and synthetically prepared saline water, respectively. The performance of a three-chambered microbial osmotic fuel cell (MOFC) provided with forward osmosis (FO) membrane and cation exchange membrane (CEM) was evaluated with respect to the chemical oxygen demand (COD) removal from wastewater, electricity generation, and desalination of saline water. The MOFC wasinoculated with activated sludge and fueled with actual domestic wastewater. Results revealed that maximum removal efficiency of COD from wastewater, TDS removal efficiency from saline water, power density, and current density were

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Entropy Generation of Shell and Double Concentric Tubes Heat Exchanger
...Show More Authors

Entropy generation was studied for new type of heat exchanger (shell and double concentric tubes heat exchanger). Parameters of hot oil flow rate, temperature of inlet hot oil and pressure drop were investigated with the concept of entropy generation. The results showed that the value of entropy generation increased with increasing the flow rate of hot oil and when cold water flow rate was doubled from 20 to 40 l/min, these values were larger. On the other hand, entropy generation increased with increasing the hot oil inlet temperature at a certain flow rate of hot oil. Furthermore, at a certain hot oil inlet temperature, the entropy generation increased with the pressure drop at different hot oil inlet flow rates. Final

... Show More
View Publication Preview PDF