Preferred Language
Articles
/
vxgVU5UBVTCNdQwC1iuj
Blue Laser Underwater Optical Visible Light Communication Using Recursive OFDM
...Show More Authors

Water covers more than 75% of the earth's surface in the form of the ocean. The ocean investigation is far-fetched because the underwater environment has distinct phenomenal activities. The expansion of human activities inside underwater environments includes environmental monitoring, offshore field exploration, tactical surveillance, scientific data collection, and port security. This led to increased demand for underwater application communication systems. Therefore, the researcher develops many methods for underwater VLC Visible Light Communications. The new technology of blue laser is a type of VLC that has benefits in the application of underwater communications. This research article investigated the benefits of underwater blue laser communication with recursive OFDM for different water types and discovered the effects of baud rate, bit error rate, and latency which affected several subcarriers of the recursive OFDM that have same characteristics but different environments. The design uses a Xilinx Kintex-7 FPGA evaluation board with high-speed analog daughter card ADC/DAC. It is connected to the terminal blue laser diode as a source of transmitting and receiving signals. There are different experiments doing to find the result and discuss the characteristics of blue lasers in underwater communication for different environments.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Bayesian Tobit Quantile Regression Model Using Four Level Prior Distributions
...Show More Authors

Abstract:

      In this research we discussed the parameter estimation and variable selection in Tobit quantile regression model in present of multicollinearity problem. We used elastic net technique as an important technique for dealing with both multicollinearity and variable selection. Depending on the data we proposed Bayesian Tobit hierarchical model with four level prior distributions . We assumed both tuning parameter are random variable and estimated them with the other unknown parameter in the model .Simulation study was used for explain the efficiency of the proposed method and then we compared our approach with (Alhamzwi 2014 & standard QR) .The result illustrated that our approach

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
FREE VIBRATION ANALYSIS OF COMPOSITE LAMINATED PLATES USING HOST 12
...Show More Authors

This paper presents an application of a Higher Order Shear Deformation Theory (HOST 12) to problem
of free vibration of simply supported symmetric and antisymmetric angle-ply composite laminated plates.
The theoretical model HOST12 presented incorporates laminate deformations which account for the effects
of transverse shear deformation, transverse normal strain/stress and a nonlinear variation of in-plane
displacements with respect to the thickness coordinate – thus modeling the warping of transverse crosssections more accurately and eliminating the need for shear correction coefficients. Solutions are obtained in
closed-form using Navier’s technique by solving the eigenvalue equation. Plates with varying number of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 11 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Enhancement of Stream Cipher by Using Variant Register in Length
...Show More Authors

         Stream ciphers are an important class of encryption algorithms. There is a vast body of theoretical knowledge on stream ciphers, and various design principles for stream ciphers have been proposed and extensively analyzed. This paper  presents a new method of stream cipher, that by segmenting the plaintext into number of register then any of them combined to any other by using combination logic circuit (And, OR, JK, NOT, XOR), then using variant register in length as a key which provides security enhancement against attacks and then compare the strength of this method with RSA by calculaing the time necessary to get the original text by using the genetic algorithm. And the way that ha

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
state selection of ammonia molecular beam using tapered ring focuser
...Show More Authors

I've made extensive studies on the distribution of the electric field stable heterogeneous within intensive that contain metal rings with slope diagonal positive to a site halfway to be in its maximum value, followed by decline negative and equally to the other end of the concentrated distributed by electric stable thanking sequentially and have focused empirical studies in the pastthe molecules that you focused Pantqaúha during passage

View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Wear Behavior Performance of Polymeric Matrix Composites Using Taguchi Experiments
...Show More Authors

This research estimates the effect of independent factors like filler  (3%, 6%, 9%, 11% weight fraction), normal load (5N, 10N, 15N), and time sliding (5,7 , 9 minutes) on wear behavior of unsaturated polyester resin reinforced with jute fiber and waste eggshell and, rice husk powder composites by utilizing a statistical approach. The specimens polymeric composite prepared from resin unsaturated polyester filled with (4% weight fraction) jute fiber, and (3%, 6%, 9%, 11% weight fraction) eggshell, and rice husk by utilizing (hand lay-up) molding. Dry sliding wear experiments were carried utilizing a standard (pin on disc test setup) following a well designed empirical schedule that depends on Taguchi’s experimental design L9 (MINIT

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 22 2023
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer science and applications of networks, the security of information must be increased and make it more complex. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is important because of its strong encryption. The proposed updates are represented by encryption and decryption Rijndael S-Box using NTRU algorithm. These modifications enhance the degree of

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
Journal Of Engineering
Scheme for Generating True Random Numbers using Electro-mechanical Switches
...Show More Authors

This paper proposes a novel method for generating True Random Numbers (TRNs) using electromechanical switches. The proposed generator is implemented using an FPGA board. The system utilizes the phenomenon of electromechanical switch bounce to produce a randomly fluctuated signal that is used to trigger a counter to generate a binary random number. Compared to other true random number generation methods, the proposed approach features a high degree of randomness using a simple circuit that can be easily built using off-the-shelf components. The proposed system is implemented using a commercial relay circuit connected to an FPGA board that is used to process and record the generated random sequences. Applying statistical testing on the exp

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 30 2024
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Catalytic Microwave Pyrolysis of Albizia Branches Using Iraqi Bentonite Clays
...Show More Authors

Catalytic microwave-assisted pyrolysis of biomass is gaining popularity as an alternative to fossil fuels due to health, environmental, climate, and economic issues. This study conducted a catalytic pyrolysis process of the Albizia plant's branches using an Iraqi clay catalyst (bentonite) focusing on the variables including the biomass-particle size, experimental time, microwave power level, and the catalyst-to-biomass ratio. The physical and chemical properties of the resulting biofuel were analyzed presented by HHV, acidity, density, viscosity, GC-MS, FTIR for bio-oil and SEM, EDX, BET, HHV, FTIR for biochar. The study revealed that addition of bentonite as a catalyst led to enhanced production of biogas produced from 5% to 45% an

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archive
Genetic analysis of sorghum cultivars from USA using SSR markers
...Show More Authors

Scopus (12)
Scopus
Publication Date
Mon Mar 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of atropine from Datura Innoxia using liquid membrane Technique
...Show More Authors

Selective recovery of atropine from Datura innoxia seeds was studied. Applying pertraction in a rotating film contactor (RFC) the alkaloid was successfully recovered from native aqueous extracts obtained from the plant seeds. Decane as a liquid membrane and sulfuric acid as a stripping agent were used. Pertraction from native liquid extracts provided also a good atropine refinement, since the most of co-extracted from the plant species remained in the feed or membrane solution. Solid–liquid extraction of atropine from Datura innoxia seeds was coupled with RF-pertraction in order to purify simultaneously the extract obtained from the plant. Applying the integrated process, proposed in this study, a product containing 92.6% atropine was

... Show More
View Publication Preview PDF