Preferred Language
Articles
/
9ReZsI4BVTCNdQwCi1b3
A hybrid technique for solving fractional delay variational problems by the shifted Legendre polynomials
...Show More Authors

This study presents a practical method for solving fractional order delay variational problems. The fractional derivative is given in the Caputo sense. The suggested approach is based on the Laplace transform and the shifted Legendre polynomials by approximating the candidate function by the shifted Legendre series with unknown coefficients yet to be determined. The proposed method converts the fractional order delay variational problem into a set of (n + 1) algebraic equations, where the solution to the resultant equation provides us the unknown coefficients of the terminated series that have been utilized to approximate the solution to the considered variational problem. Illustrative examples are given to show that the recommended approach is applicable and accurate for solving such kinds of problems.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
The Analyst
A luminescent europium complex for wide-range pH sensors and sensor microtiterplates
...Show More Authors

Luminescent sensor membranes and sensor microplates are presented for continuous or high-throughput wide-range measurement of pH based on a europium probe.

View Publication
Scopus (13)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Mon Jul 31 2023
Journal Name
Iraqi Geological Journal
Building of a Static Model for Jeribe Formation in Jambour Oil Field
...Show More Authors

The Jeribe Formation, the Jambour oil field, is the major carbonate reservoir from the tertiary reservoirs of the Jambour field in northern Iraq, including faults. Engineers have difficulty organizing carbonate reserves since they are commonly tight and heterogeneous. This research presents a geological model of the Jeribe reservoir based on its facies and reservoir characterization data (Permeability, Porosity, Water Saturation, and Net to Gross). This research studied four wells. The geological model was constructed with the Petrel 2020.3 software. The structural maps were developed using a structural contour map of the top of the Jeribe Formation. A pillar grid model with horizons and layering was designed for each zone. Followin

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jul 02 2013
Journal Name
Journal Of Baghdad College Of Dentistry
Local Drug Delivery Systems for Treating Periodontal Diseases: A Review of Literature
...Show More Authors

Publication Date
Wed Apr 28 2021
Journal Name
Journal Of Engineering
A Ultra-broadband Thin Metamaterial Absorber for Ku and K Bands Applications
...Show More Authors

In this paper, a design of the broadband thin metamaterial absorber (MMA) is presented. Compared with the previously reported metamaterial absorbers, the proposed structure provides a wide bandwidth with a compatible overall size. The designed absorber consists of a combination of octagon disk and split octagon resonator to provide a wide bandwidth over the Ku and K bands' frequency range. Cheap FR-4 material is chosen to be a substate of the proposed absorber with 1.6 thicknesses and 6.5×6.5 overall unit cell size. CST Studio Suite was used for the simulation of the proposed absorber. The proposed absorber provides a wide absorption bandwidth of 14.4 GHz over a frequency range of 12.8-27.5 GHz with more than %90 absorp

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jun 09 2025
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
A novel improvement of skew tent map for generating Pseudo random numbers
...Show More Authors

An encryption system needs unpredictability and randomness property to maintain information security during transmission and storage. Although chaotic maps have this property, they have limitations such as low Lyapunov exponents, low sensitivity and limited chaotic regions. The paper presents a new improved skewed tent map to address these problems. The improved skew tent map (ISTM) increases the sensitivity to initial conditions and control parameters. It has uniform distribution of output sequences. The programs for ISTM chaotic behavior were implemented in MATLAB R2023b. The novel ISTM produces a binary sequence, with high degree of complexity and good randomness properties. The performance of the ISTM generator shows effective s

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Expert Systems With Applications
A long short-term recurrent spatial-temporal fusion for myoelectric pattern recognition
...Show More Authors

View Publication
Scopus (24)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Traitement Du Signal
A Comprehensive Review on Machine Learning Approaches for Enhancing Human Speech Recognition
...Show More Authors

View Publication
Scopus (1)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (10)
Crossref
Publication Date
Thu Dec 31 2020
Journal Name
Political Sciences Journal
Islamic feminism is a discussion of paths for establishing an Islamic epistemology
...Show More Authors

If feminist philosophy in the context of feminist research focuses on how to produce an alternative knowledge and culture for women and forming anew awareness of their roles in the face of prevailing misconceptions then the topic of Islamic feminism is presented as a philosophical topic in the field of human knowledge to discuss how to produce an alternative knowledge of traditional knowledge prevailing in patriarchal societies to restore the balance of power and authority in the relationship between the sexes to create an effective feminist role in advocating for and defending womenś issues to achieve this Islamic feminism sought to establish an Islamic epistemology .

View Publication Preview PDF
Crossref