Preferred Language
Articles
/
JxbtIIgBVTCNdQwCaXTN
The effect of the smoothing filter on an image encrypted by the blowfish algorithm then hiding it in a BMP image
...Show More Authors

order to increase the level of security, as this system encrypts the secret image before sending it through the internet to the recipient (by the Blowfish method). As The Blowfish method is known for its efficient security; nevertheless, the encrypting time is long. In this research we try to apply the smoothing filter on the secret image which decreases its size and consequently the encrypting and decrypting time are decreased. The secret image is hidden after encrypting it into another image called the cover image, by the use of one of these two methods" Two-LSB" or" Hiding most bits in blue pixels". Eventually we compare the results of the two methods to determine which one is better to be used according to the PSNR measurs

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 10 2017
Journal Name
Superconductor Science And Technology
Conceptual designs of conduction cooled MgB<sub>2</sub> magnets for 1.5 and 3.0 T full body MRI systems
...Show More Authors

View Publication
Scopus (68)
Crossref (65)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Journal Of Engineering
Production of Load Bearing Concrete Masonry Units (blocks) From Green Concrete Containing Plastic Waste and Nano Silica Sand Powder
...Show More Authors

Industrial development has recently increased, including that of plastic industries. Since plastic has a very long analytical life, it will cause environmental pollution, so studies have resorted to reusing recycled waste plastic (sustainable plastic) to produce environmentally friendly concrete (green concrete). In this research, producing environmentally friendly load-bearing concrete masonry units (blocks) was considered where five concrete mixtures were compressed at the blocks producing machine. The cement content reduced from 400 kg/m3 (B-400) to 300 kg/m3 (B-300) then to 200 kg/m3 (B-200). While (B-380) was produced using 380 kg/m3 cement and 20 kg/m3 nano-sil

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Thermophysical properties of [EMIM][BF<sub>4</sub>] and [HMIM][PF<sub>6</sub>] imidazolium ionic liquids with MWCNTs
...Show More Authors
Abstract<p>In this study, several ionanofluids (INFs) were prepared in order to study their efficiency as a cooling medium at 25 °C. The two-step technique is used to prepare ionanofluid (INF) by dispersing multi-walled carbon nanotubes (MWCNTs) in two concentrations 0.5 and 1 wt% in ionic liquid (IL). Two types of ionic liquids (ILs) were used: hydrophilic represented by 1-ethyl-3-methylimidazolium tetrafluoroborate [EMIM][BF<sub>4</sub>] and hydrophobic represented by 1-hexyl-3-methylimidazolium hexafluorophosphate [HMIM][PF<sub>6</sub>]. The thermophysical properties of the prepared INFs including thermal conductivity (TC), density and viscosity were measured experimental</p> ... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Nov 19 2022
Journal Name
Journal Of Solid State Electrochemistry
Thermal, electrical and electrochemical properties of ionic liquid-doped poly(ethylene oxide)–LiTDI polymer electrolytes for Li-ion batteries
...Show More Authors

View Publication
Scopus (23)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Evaluation of Turkish Delight Prepared With Pigments And Essential Oils Extracted From Clementine (Citrus Clementine) Peels As Natural Antioxidants
...Show More Authors

This experiment presented essential oils by GC/MS, pigment content, and their antioxidant activities as well as sensory evaluation of delight samples. Limonene (66.88%) was the most prevalent yield. The peels of clementine had DPPH and ABT Scavenging activity. All levels of pigment extract had better scores for all sensory values and recorded acceptable scores in terms of appearance, color, aroma, and overall acceptability compared to control delight. Besides, delight samples containing 15 mg astaxanthin pigment extract showed maximum sensory scores compared to other samples and control delight. On the other hand, the product was less acceptable to the panelists compared to control in the case of the addition of 3.75 mg astaxanthin pigme

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Results In Engineering
Thermodynamic modeling and performance analysis of photovoltaic-thermal collectors integrated with phase change materials: Comprehensive energy and exergy analysis
...Show More Authors

View Publication
Scopus (23)
Crossref (10)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Aip Conference Proceedings
Preparation and characterization of biomass-alumina composite as adsorbent for safranine-o dye from aqueous solution at different temperatures
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Thu Feb 06 2020
Journal Name
Scientific Reports
Waste foundry sand/MgFe-layered double hydroxides composite material for efficient removal of Congo red dye from aqueous solution
...Show More Authors
Abstract<p>We aimed to obtain magnesium/iron (Mg/Fe)-layered double hydroxides (LDHs) nanoparticles-immobilized on waste foundry sand-a byproduct of the metal casting industry. XRD and FT-IR tests were applied to characterize the prepared sorbent. The results revealed that a new peak reflected LDHs nanoparticles. In addition, SEM-EDS mapping confirmed that the coating process was appropriate. Sorption tests for the interaction of this sorbent with an aqueous solution contaminated with Congo red dye revealed the efficacy of this material where the maximum adsorption capacity reached approximately 9127.08 mg/g. The pseudo-first-order and pseudo-second-order kinetic models helped to describe the sorption measure</p> ... Show More
Scopus (192)
Crossref (129)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Equilibrium, Kinetic, and Thermodynamic Study of Removing Methyl Orange Dye from Aqueous Solution Using Zizphus spina-christi Leaf Powder
...Show More Authors

In this study, Zizphus spina-christi leaf powder was applied for the adsorption of methyl orange. The effect of different operating parameters on the Batch Process adsorption was investigated such as solution pH (2-12), effect of contact time (0-60 min.), initial dye concentration (2-20 mg/L), effect of adsorbent dosage (0-4.5 g) and effect of temperature (20-50ᵒC). The results show a maximum removal rate and adsorption capacity (%R= 23.146, qe = 2.778 mg/g) at pH = 2 and equilibrium was reached at 40 min. The pseudo- second-order kinetics were found to be best fit for the removal process (R2 = 0.997). Different isotherm models (Langmuir, Freundlich, Dubini-Radushkevich,Temkin)  were applied in this stud

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref