In this article the conventional "solid-state reaction" method was used to synthesize perovskite Li0.4Cd0.6Ba2Ca2Cu3O10+δ. Four main types of compounds were obtained by physically replacing calcium oxide with cadmium in proportions 0, 0.03, 0.06 and 0.09, the pure Li0.4Cd0.6Ba2Ca2Cu3O10+δ phase, and the phases Li0.4Cd0.6Ba2Ca1.97Cd0.03Cu3O10+δ and Li0.4Cd0.6Ba2Ca1.94Cd0.06Cu3O10+δ and Li0.4Cd0.6Ba2Ca1.91Cd0.09Cu3O10+δ ,respectively from mixing their constituent oxides and pressed into pelts and then sintered in the furnace at 850 degrees Celsius for 90 hours: These samples have been studied for their original dielectrically properties. The real dielectric constant, dielectric loss factor, and tangent were calculated in the frequency range (50 to 1000000 HZ). It was found that the partial substitution of cadmium oxide plays an important role in enhancing dielectrically properties.
he study aimed to purify of Leucine aminopeptidase (LAP) from sera of hyperthyroidism patients and its relation to some thyroid hormones (TSH, T 3 , T 4 ) of subclinical hyperthyroidism and hyperthyroidism patients with lipid peroxidation levels that may be play a role in this diseases. Specimens were collected during the time from Nov 2017 until Jan 2018 from Endocrine and Diabetes Center, blood samples were collected from fifty healthy control and one hundred patients, patients were divided into two groups consisted of (50) with hyperthyroidism and (50) with subclinical hyperthyroidism. The aged for all subjects ranged (15-60) years with body mass ranged ((25- 29) kg/m 2 . The purification is done by addition of ammonium sulfate, dial
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreIntrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system
... Show MorePattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o
... Show MoreCryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti
... Show MoreIn this paper, silicon carbonitried thin films were prepared by the method of photolysis of the silane (SiH4) and ethylene (C2H4) gases, with and without ammonia gas (NH3), which is represented by the ratio between the (PNH3) and (PSiH4 + PC2H4 + PNH3), (which assign by the letter X), X has the values (0, 0.13, 0.33). This method carried out by using TEA-CO2 laser, on glass substrate at (375 oC), deposition rate (0.416-0.833) nm/pulse thin film thickness of (500-1000) nm. The optical properties of the films were studied by using Absorbance and Transmittance spectrums in wavelength range of (400-1100) nm, the results showed that the electronic transitions is indirect and the energy gap for the SiCN films increase with increasing of nitrog
... Show MoreA cross-sectional study was conducted on 80 type 2 diabetic patients aged 20-60 years in Baghdad and 20 non diabetic persons as controls. Laboratory assessment of glucose related parameters; Fasting blood sugar (FBS), Glycated hemoglobin (HbA1c), Insulin and Insulin resistance (IR), renal function test; Blood urea, serum creatinine, Calcium (Ca) and Phosphorus (P), Calcium regulating hormones; Parathyroid hormone (PTH), calcitonin and vitamin D, cytokines, Adiponectin and Tumor necrosis factor (TNF-α) and comparison these parameters between patients and controls. The results: a high significant (p˂0.01) increase in FBG level in the patients (211.34 ± 11.20 mg/dl) as compared with control (85.89 ± 3.07 mg/dl). A high significant (p˂0.01
... Show MoreThe study of the future of the international system currently appears, according to scientific data and existing facts in light of the emergence of international actors from non-states and international informal institutions, to be heading towards a non-polarity system and this trend is fueled by many variables to reduce polarity, and it is expected in the future that the international system will turn into a non-polarity.