Preferred Language
Articles
/
xBdjbI4BVTCNdQwCRUdC
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 03 2019
Journal Name
Journal Of The College Of Education For Women
Reading of teacher s role and position in Ibn -Al - Kateeb s book , acquaintance
...Show More Authors

0

View Publication Preview PDF
Publication Date
Wed Oct 02 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Investigation over Efficient Broadcasting Mechanism in MANET
...Show More Authors

Mobile ad hoc network is nothing but the temporary network which is having the collection of mobile nodes. Routing and broadcasting are major operations of MANET network. The major operation in ad hoc mobile network is the broadcasting which sometime results to storm problem of the broadcast if the forwarding mechanism is not properly designated. Thus the challenges in the MANET are to reduce the broadcasting redundancy and under high transmission error rate provides high delivery ratio. Hence in our proposed research, we are introducing and investigating the new mechanism of broadcasting called Dual Covered Broadcast. This method takes the broadcast redundancy advantage order to improve packet delivery ratio especially under environments w

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 27 2022
Journal Name
Journal Of Engineering Research And Sciences
Images Compression using Combined Scheme of Transform Coding
...Show More Authors

Some problems want to be solved in image compression to make the process workable and more efficient. Much work had been done in the field of lossy image compression based on wavelet and Discrete Cosine Transform (DCT). In this paper, an efficient image compression scheme is proposed, based on a common encoding transform scheme; It consists of the following steps: 1) bi-orthogonal (tab 9/7) wavelet transform to split the image data into sub-bands, 2) DCT to de-correlate the data, 3) the combined transform stage's output is subjected to scalar quantization before being mapped to positive, 4) and LZW encoding to produce the compressed data. The peak signal-to-noise (PSNR), compression ratio (CR), and compression gain (CG) measures were used t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Green Synthesis of Iron Oxide Nanoparticles and Their Modification with CTAB for the Decolorization of Dye Reactive Blue 238
...Show More Authors

     Magnetized iron oxide nanoparticles (NPs) were prepared using Eucalyptus leaf extract and then coated with CTAB (Cetrimonium bromide) to increase efficiency. The prepared and modified (NPs) were characterized using AFM, FTIR, and X-ray techniques. The adsorption of the dye reactive blue RB 238 on coated (NPs) was investigated. The effect of various experimental factors, such as the initial concentration of the dye, the amount of adsorbent, pH and temperature on the removal of RB238 was studied. The best conditions for dye removal were found to be 298 K in an acidic medium of pH = 3 and an appropriate dose of the adsorbent of 0.15 g per 25 mg/L to achieve the best color removal of 90% within 60 minutes. The pseudo-second-order re

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 10 2025
Journal Name
Journal Of College Of Law For Legal And Political Sciences
Management's responsibility for breach of investment administrative contracts
...Show More Authors

View Publication
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Human Face Recognition Based on Local Ternary Pattern and Singular Value Decomposition
...Show More Authors

There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
2014 International Conference On Computer And Information Sciences (iccoins)
Proposed conceptual model for E-service quality in Malaysian universities
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref