Preferred Language
Articles
/
0ReIMI8BVTCNdQwCbF_n
DETERMINING AN APPROPRIATE INITIAL VALUE OF ECCENTRICITY FOR LOW EARTH SATELLITES USING EULER METHOD
...Show More Authors

The major goal of this research was to use the Euler method to determine the best starting value for eccentricity. Various heights were chosen for satellites that were affected by atmospheric drag. It was explained how to turn the position and velocity components into orbital elements. Also, Euler integration method was explained. The results indicated that the drag is deviated the satellite trajectory from a keplerian orbit. As a result, the Keplerian orbital elements alter throughout time. Additionally, the current analysis showed that Euler method could only be used for low Earth orbits between (100 and 500) km and very small eccentricity (e = 0.001).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 22 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
MRI images series segmentation using the geodesic deformable model
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
2016 2nd International Conference On Science In Information Technology (icsitech)
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Automatic Health Speech Prediction System Using Support Vector Machine
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (9)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Real Time Motion Detection in Surveillance Camera Using MATLAB
...Show More Authors

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. In case of location have less percentage of movement (like home courtyard during night); then we need to check whole recorded video to show where and when that motion occur which are wasting in time. So this paper aims at processing the real time video captured by a Webcam to detect motion in the Scene using MATLAB 2012a, with keeping in mind that camera still recorded which means real time detection. The results show accuracy and efficiency in detecting motion

Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Science
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS
...Show More Authors

Scopus (3)
Scopus
Publication Date
Wed Nov 20 2019
Journal Name
Proceedings Of The 2019 3rd International Conference On Big Data Research
Pressure Vessel Design Simulation Using Hybrid Harmony Search Algorithm
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Wuhaib, K.m. , Hadi, B.h. , Hassan, W.a. Iraqi Journal Of Agricultural Sciences, 2016, 47(5), Pp. 1151–1165
Some genetic parameter in maize using full diallel crosses
...Show More Authors

Scopus (8)
Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Science International
USING CRYPTOANALYSIS POLICIES AND TECHNIQUES TO CREATE STRONG PASSWORD
...Show More Authors

Publication Date
Sat Mar 30 2024
Journal Name
Wasit Journal For Pure Sciences
Arabic and English Texts Encryption Using Modified Playfair Algorithm
...Show More Authors

To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of

... Show More
View Publication Preview PDF
Crossref