Preferred Language
Articles
/
zBYHC4cBVTCNdQwCujJr
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

View Publication
Publication Date
Fri Jan 01 2021
Journal Name
Journal Of Physics: Conference Series 2nd International Conference On Physics And Applied Sciences
Synthesis and characterization of metastable phases of SnO and Sn3O4 thin films for solar cells applications
...Show More Authors

Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Physics: Conference Series
Synthesis and characterization of metastable phases of SnO and Sn3O4 thin films for solar cells applications
...Show More Authors
Abstract<p>Meta stable phase of SnO as stoichiometric compound is deposited utilizing thermal evaporation technique under high vacuum onto glass and p-type silicon. These films are subjected to thermal treatment under oxygen for different temperatures (150,350 and 550 °C ). The Sn metal transformed to SnO at 350 oC, which was clearly seen via XRD measurements, SnO was transformed to a nonstoichiometric phase at 550 oC. AFM was used to obtain topography of the deposited films. The grains are combined compactly to form ridges and clusters along the surface of the SnO and Sn3O3 films. Films were transparent in the visible area and the values of the optical band gap for (150,350 and 550 °C ) 3.1, </p> ... Show More
View Publication
Scopus (16)
Crossref (12)
Scopus Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
FM Based Localization: A Proposed Improvement
...Show More Authors

Localization is an essential issue in pervasive computing application. FM performs worse in some indoor environment when its structure is same to some extent the outdoor environment like shopping mall. Furthermore, FM signal are less varied over time, low power consumption and less effected by human and small object presence when it compared to Wi-Fi. Consequently, this paper focuses on FM radio signal technique and its characteristics that make it suitable to be used for indoor localization, its benefits, areas of applications and limitations.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (21)
Crossref (19)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Journal Of Engineering
An Extensive Literature Review on Risk Assessment Models (Techniques and Methodology) for Construction Industry
...Show More Authors

This study looks into the many methods that are used in the risk assessment procedure that is used in the construction industry nowadays. As a result of the slow adoption of novel assessment methods, professionals frequently resort to strategies that have previously been validated as being successful. When it comes to risk assessment, having a precise analytical tool that uses the cost of risk as a measurement and draws on the knowledge of professionals could potentially assist bridge the gap between theory and practice. This step will examine relevant literature, sort articles according to their published year, and identify domains and qualities. Consequently, the most significant findings have been presented in a manne

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Time and Design Construction for Costumes in the Iraqi Theater Show: محمــود جبــاري حــافظ
...Show More Authors

The theatre costume with the rest of the theatre show elements constitute a system of the meaning relations that produce a visual image that helps the recipient to decipher the theatre scene, let alone the manifestation of time in its levels (past, present, future) through the design construction of the theatre elements among which is the theatre costume. In order to know the way of manifesting time through the formulation of the theatre costumes, the research question has been put as follows:  how to manifest time through the design construction for the theatre costumes unit, from which the research objective is derived as follows: Revealing the possibility of the designing unit of the costumes in manifesting the levels of time wit

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
...Show More Authors

     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution
...Show More Authors

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
A New Model Design for Combating COVID -19 Pandemic Based on SVM and CNN Approaches
...Show More Authors

       In the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from      Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref