Preferred Language
Articles
/
5heU5I8BVTCNdQwCp39D
Cryptanalysis for Brute Force Attack and XOR Ciphering Methods
...Show More Authors

Publication Date
Wed Jul 17 2019
Journal Name
Aip Conference Proceedings
The correction of the line profiles for x-ray diffraction peaks by using three analysis methods
...Show More Authors

In this study used three methods such as Williamson-hall, size-strain Plot, and Halder-Wagner to analysis x-ray diffraction lines to determine the crystallite size and the lattice strain of the nickel oxide nanoparticles and then compare the results of these methods with two other methods. The results were calculated for each of these methods to the crystallite size are (0.42554) nm, (1.04462) nm, and (3.60880) nm, and lattice strain are (0.56603), (1.11978), and (0.64606) respectively were compared with the result of Scherrer method (0.29598) nm,(0.34245),and the Modified Scherrer (0.97497). The difference in calculated results Observed for each of these methods in this study.

View Publication
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed Aug 18 2021
Journal Name
Chemical Papers
Analytical methods for the identification of micro/nano metals in e-cigarette emission samples: a review
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Nov 04 2018
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
MEASURING OBESITYLEVEL BY BIO-ELECTRICAL IMPEDANCE ANALYSIS TECHNIQUE AND COMPARED TO TRADITIONAL METHODS: MEASURING OBESITYLEVEL BY BIO-ELECTRICAL IMPEDANCE ANALYSIS TECHNIQUE AND COMPARED TO TRADITIONAL METHODS
...Show More Authors

This study aimed to determine obesity level of some population in Baghdad by using Bio-electrical impedance analysis (BIA) and compared with anthropometric measurements such as body mass index (BMI), waist circumference (WC) and waist-to-hip ratio (WHR). Statistical analysis results of linear correlation coefficients for obesity indicators showed that BIA correlation 0.92 was most significant and reliable for obesity measurement.

Results of BIA method for age group 20-29 years showed that 44.4% of females were healthy body while 37.8% of males suffer from increased body fat. Results of age group 30-39 year showed that 32.6 of females were in healthy body and 42% of males were obese. In case age group 40-4

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 09 2026
Journal Name
Journal Of Baghdad College Of Dentistry
The relationship among bite force with facial dimensions and dental arches widths in a sample of Iraqi adults with Class I skeletal and dental relations
...Show More Authors

Background: This study aimed to determine whether there is a relationship among the bite force with facial dimensions and dental arches in a sample of Iraqi adults with Class I skeletal and dental relations. Materials and methods: Forty dental students (20 males and 20 females) were selected under certain criteria. For those individuals, dental impressions, frontal facial photographs and maximum bite force at molar and incisor regions were taken. The dental arches widths and facial dimensions were measured using the AutoCAD program 2007, while the bite force was determined using special device. Descriptive statistics for the measured variables were performed and gender difference was determined using independent sample t-test, while the rel

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Environmental Engineering And Management Journal
TREATMENT OF DAIRY WASTEWATER BY ELECTROCOAGULATION AND ULTRASONIC-ASSISTED ELECTROCOAGULATION METHODS
...Show More Authors

View Publication
Crossref (6)
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
Effect of Laser Cutting Methods on Hole Deviation and Surface Integrity
...Show More Authors

In the present work usedNd:YAG laser systems of different output characteristic were employed to study the drilling process of material used in scientific and industrial fields. This material include Manganese hard steel. Our study went into the affecting parameters in drilling of Manganese hard steel by laser. Drilling process is achieved through material absorption of part of the incident laser beam. It is the resultant of interfering both, laser beam and material properties and the focusing conditions of the beam. The results as shown that the increase in the laser pulse energy over the used level has raised the hole diameter, depth and increased the hole taper. In addition to that a hole taper was affected by the laser energy, the fo

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 07 2021
Journal Name
Jurnal Teknologi
MODELS, DETECTION METHODS, AND CHALLENGES IN DC ARC FAULT: A REVIEW
...Show More Authors

The power generation of solar photovoltaic (PV) technology is being implemented in every nation worldwide due to its environmentally clean characteristics. Therefore, PV technology is significantly growing in the present applications and usage of PV power systems. Despite the strength of the PV arrays in power systems, the arrays remain susceptible to certain faults. An effective supply requires economic returns, the security of the equipment and humans, precise fault identification, diagnosis, and interruption tools. Meanwhile, the faults in unidentified arc lead to serious fire hazards to commercial, residential, and utility-scale PV systems. To ensure secure and dependable distribution of electricity, the detection of such ha

... Show More
View Publication
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Jul 02 2017
Journal Name
Journal Of Educational And Psychological Researches
Down Syndrome causes, symptoms, and most important methods of functional treatment
...Show More Authors

This study is descriptive and theory of Dawn syndrome as the problem of research lies in the need to identify the identification of the causes of Dawn syndrome and its symptoms and methods of dealing with it, which has become a problem that needs treatment, especially after the numbers have become high in Iraq, which has not yet taken the necessary importance for treatment and care.

The objectives of the research were summarized in the identification of the most important causes of Dawn syndrome and its symptoms and diagnosis and ways or methods of dealing with people with Dawn syndrome in order to develop therapeutic plans for him.

       

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of Partial Least Squares and Principal Components Methods by Simulation
...Show More Authors

Abstract                                                                                              

The methods of the Principal Components and Partial Least Squares can be regard very important methods  in the regression analysis, whe

... Show More
View Publication Preview PDF
Crossref