Preferred Language
Articles
/
xBdjbI4BVTCNdQwCRUdC
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Apr 17 2016
Journal Name
Al-academy
Stability and periphery in Graphic design: دينا محمد عناد
...Show More Authors

Graphic design art depends on changeable cognitive systems which their relation and items relying on the accumulation of humane knowledge and thong and the humane look to the venality and his explanation to the relation between him and the venality , then the graphic design art becomes an important item of this accumulation knowledge besides , it is on kind of knowledge kinds . The technological advancement in communication lauds to increasing in communication media and design methods , where the computer and its application in graphic design promotes the design process because of it's capalebities which lead to in creasing in production process , minimizing the cost and time and achieving creative and aesthetic aspect because of it's fe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Credit Card Fraud Detection Using Improved Deep Learning Models
...Show More Authors

View Publication
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Iop Conference Series: Earth And Environmental Science
Effect of Blue and Red LED Light and some Plant Extract on Lettuce Growth and Yield in NFT Technique
...Show More Authors
Abstract<p>This experiment was carried out in the College of Agricultural Engineering Sciences, Univ. of Baghdad, during autumn 2021 growing season to investigate possibility study of increase lettuce antioxidant and biological yield, growing and producing lettuce hydroponically under film technique (NFT) using a globally approved standard solution (Cooper solution), Nested design with three replications adopted in the experiment, each of them included in main plot the first factor, which is LED light (B and R), Then levels of second factor were randomly distributed within each replicate, which included spraying with organic nutrients which was Cymbopogon citratus and Hibiscus sabdariffa at two </p> ... Show More
View Publication Preview PDF
Scopus (5)
Scopus Crossref
Publication Date
Sun Nov 10 2019
Journal Name
Journal Of Engineering And Applied Sciences
Fabrication and Properties of Ag<sub>2</sub>O/Si Heterojunction Solar Cell Pure and Doped (Sb, Sn and Se)
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun Aug 06 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Ultrasonic and Viscosity Studies of Poly ( Acrylic Acid ) Solutions
...Show More Authors

Ultrasonic absorption, velocity, viscosity, adiabatic compressibility, relaxation time and relaxation amplitude measurements are reported on different concentrations of poly(acrylic acid) solutions in common solvent water using pulsed ultrasonic apparatus technique operating at 26 kHz and 30 ºC. Results show an increase of velocity, viscosity, and absorption coefficient ،relaxation time and relaxation amplitude values with the increasing concentrations of the poly(acrylic acid) solutions, which might be the result of structural fluctuations of polymer molecules such as the segmental motions of the polymer chains. In contrast the compressibility decreases with the increasing concentration of this polymer. This study suggests there i

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Medical Journal Of Babylon
Dual and Multiple AV Nodal Pathways, What is The Deference in Typical Atrioventricular Nodal Reentrant Tachycardia
...Show More Authors

Abstractin adult typical atrioventricular nodal reentrant tachycardia (AVNRT) consider most common paroxysmalsupraventricular tachycardia. Dual pathway idea still accepted and used widely and commonly. According tothe guide line, ablations of slow pathway still the first treatment with good success rate.Identify the electrophysiological difference of atrioventricular nodal pathways pre and post ablation.Electrophysiological study was done to 54 patients with only typical type AVNRTs; they were 40 (74%)females and 14 (26%) males. Divided into two groups G1 with 38 patients (70.4%) having one pathway andG2 with 16 patients (29.6%) with multiple pathway. After induction we study the clinical andelectrophysiological feature of tachycardia and s

... Show More
Publication Date
Sat Sep 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
E·voiution of Topology and Wei,ght-s. of Neural Netwo·rks. Using.Semi Genetic Operators
...Show More Authors

Evolutionary·co.nipimit'iQo  is  a· c'!a s of glbbal ·searb  techniq

based on the lei.lffi:ing process ,of  g po_pl)'latiog-·of pote.n:tiaf solutions to

a  ven probl_e-ID'.  thahas .been  succe_ssfull'y  applied    19  v ety of

prQblern, lll thls paper a riew approach  to. design lie_ ural ne'twQj:ks

based oh ev.ohltipnary -computa.tio.rt i·s pre.Seri-L  _A   tine-f.!£ clurP.mosome

'repr:esentati:on  or the etwor}< i_s.  u_secl: 'Q.y  genetiC  gperntb_l:s, whicQ

allow th¢  voJution of.the   chitecture and' weight-s Â

... Show More
View Publication Preview PDF
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors

Concealing the existence of secret hidden message inside a cover object is known as steganography, which is a powerful technique. We can provide a secret communication between sender and receiver using Steganography. In this paper, the main goal is for hiding secret message into the pixels using Least Significant Bit (LSB) of blue sector of the cover image. Therefore, the objective is by mapping technique presenting a model for hiding text in an image. In the model for proposing the secret message, convert text to binary also the covering (image) is divided into its three original colors, Red, Green and Blue (RGB) , use the Blue sector convert it to binary,  hide two bits from the message in  two bits of the least significant b

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Hiding Data in Color Image Using Least Significant Bits of Blue Sector
...Show More Authors