Preferred Language
Articles
/
zhZ2UIkBVTCNdQwC1YhI
Heterocyclic compounds-based liquid crystals: Synthesis and mesomorphic properties
...Show More Authors

A series of liquid crystals comprising a heterocyclics dihydro pyrrole and 1,2,3-triazole rings [VII]-[X] were synthesized by many steps starting from a reaction of 3,3'-dimethyl-[1,1'-biphenyl]- 4,4'-diamine with chloroacetyl chloride in a mixture of solutions DMF and TEA to synthesise the compounds [I], then the compounds [I] reacted with malononitrile in 1,4-dioxane and TEA solutions to produce compounds [II], then the first step is repeated with compound [II] where it reacted with chloroacetyl chloride in mixture of DMF and TEA to give compound [III], this compound reacted with sodium azide in the presence of sodium chloride and DMF as solvent to produce the compound [IV], which reacted with acrylic acid by a 1.3 dipolar reaction in solvent THF to give compound [V], this compound which reacted with thionyl chloride to gave carbonyl chlorides compound [VI], finally the last compound reacted with a variety of amines to product compounds [VII]a-d. The structures of the synthesized compounds were actually determined by Fourier-transform infrared spectroscopy FT-IR and Proton nuclear magnetic resonance 1H-NMR, The properties of liquid crystalline were characterized by hot stage Polarising Optical Microscope POM. The synthesized molecules exhibited enantiotropic liquid crystal phases, and the compounds [VII]a-d exhibited an enantiotropic nematic phase only.

Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Fingerprints Identification and Verification Based on Local Density Distribution with Rotation Compensation
...Show More Authors

The fingerprints are the more utilized biometric feature for person identification and verification. The fingerprint is easy to understand compare to another existing biometric type such as voice, face. It is capable to create a very high recognition rate for human recognition. In this paper the geometric rotation transform is applied on fingerprint image to obtain a new level of features to represent the finger characteristics and to use for personal identification; the local features are used for their ability to reflect the statistical behavior of fingerprint variation at fingerprint image. The proposed fingerprint system contains three main stages, they are: (i) preprocessing, (ii) feature extraction, and (iii) matching. The preprocessi

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Mon Aug 18 2025
Journal Name
Journal Of Engineering
Design and Implementation of ICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

View Publication
Publication Date
Mon Apr 15 2024
Journal Name
Journal Of Engineering Science And Technology
Text Steganography Based on Arabic Characters Linguistic Features and Word Shifting Method
...Show More Authors

In the field of data security, the critical challenge of preserving sensitive information during its transmission through public channels takes centre stage. Steganography, a method employed to conceal data within various carrier objects such as text, can be proposed to address these security challenges. Text, owing to its extensive usage and constrained bandwidth, stands out as an optimal medium for this purpose. Despite the richness of the Arabic language in its linguistic features, only a small number of studies have explored Arabic text steganography. Arabic text, characterized by its distinctive script and linguistic features, has gained notable attention as a promising domain for steganographic ventures. Arabic text steganography harn

... Show More
Publication Date
Sat Jul 01 2023
Journal Name
Int. J. Advance Soft Compu. Appl,
Arabic and English Texts Encryption Using Proposed Method Based on Coordinates System
...Show More Authors

Preview PDF
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Spatial Response Uniformity of Silicon–Based CdS and PbS Heterojunction Laser Detectors
...Show More Authors

This paper demonstrates the spatial response uniformity (SRU) of two types of heterojunctions (CdS, PbS /Si) laser detectors. The spatial response nonuniformity of these heterojunctions is not significant and it is negligible in comparison with p+- n silicon photodiode. Experimental results show that the uniformity of CdS /Si is better than that of PbS /Si heterojunction

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (18)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Iet Signal Processing
Signal compression and enhancement using a new orthogonal‐polynomial‐based discrete transform
...Show More Authors

View Publication
Scopus (41)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jan 14 2023
Journal Name
Cogent Engineering
C. B interrupt duty reduction based controlling TRV and symmetrical breaking current
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref