Preferred Language
Articles
/
MBhh5pYBVTCNdQwCV4lU
تحضير الكاربون المنشط المايكروي والنانوي من مخلفات حبوب الذرة باستخدام الكربنة الحرارية واشعاع المايكروويف
...Show More Authors

This research work involves the preparation of nano activated carbonand macro activated carbon from corn seeds with a various mixing ratio ofpotassium hydroxide (1:0, 1:0.2, 1:0.4, 1:0.6, 1:0.8 and 1:1) % using thermaland micro radiation carbonization to identify the best mixing ratio. At studyto confirmed that the efficiency and effectiveness of the prepared of activatedcarbon samples increase when ratio potassium hydroxide increase with athermal and micro radiation carbonization was used. The study of samplesexternal surface area was performed via studying the adsorption of methyleneblue from their aqueous solution, also measured the internal surface area wasperformed via studying the adsorption of iodine from their aqueous solution.Measurement of density and humidity content were also been studied. Todetermine the efficiency and effectivity prepared samples. The samples werecharacterized by atomic force microscope (AFM), scanning electronmicroscopy (SEM)

Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
An Efficient Image Encryption Using a Dynamic, Nonlinear and Secret Diffusion Scheme
...Show More Authors

The growing use of tele

This paper presents a new secret diffusion scheme called Round Key Permutation (RKP) based on the nonlinear, dynamic and pseudorandom permutation for encrypting images by block, since images are considered particular data because of their size and their information, which are two-dimensional nature and characterized by high redundancy and strong correlation. Firstly, the permutation table is calculated according to the master key and sub-keys. Secondly, scrambling pixels for each block to be encrypted will be done according the permutation table. Thereafter the AES encryption algorithm is used in the proposed cryptosystem by replacing the linear permutation of ShiftRows step with the nonlinear and secret pe

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
PWRR Algorithm for Video Streaming Process Using Fog Computing
...Show More Authors

       The most popular medium that being used by people on the internet nowadays is video streaming.  Nevertheless, streaming a video consumes much of the internet traffics. The massive quantity of internet usage goes for video streaming that disburses nearly 70% of the internet. Some constraints of interactive media might be detached; such as augmented bandwidth usage and lateness. The need for real-time transmission of video streaming while live leads to employing of Fog computing technologies which is an intermediary layer between the cloud and end user. The latter technology has been introduced to alleviate those problems by providing high real-time response and computational resources near to the

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
PROJECT MANAGEMENT OF BALAD`S MAJOR SEWERAGE SYSTEM BY USING THE GOAL PROGRAMMING METHOD
...Show More Authors

Abstract

          The project of balad's major sewerage system is one of the biggest projects who is still in progress in salahulddin province provincial - development plan that was approved in 2013 . This project works in two parts ; the 1st is installing the sewerage networks (both of heavy sewerage & rain sewerage) and the 2nd is installing the     life – off units (for heavy sewerage & rain sewerage , as well) . the directorate of salahuiddin is aiming that at end of construction it will be able to provide services for four residential quarters , one of the main challenges that project's  management  experience is how to achieve thes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Text Multilevel Encryption Using New Key Exchange Protocol
...Show More Authors

The technological development in the field of information and communication has been accompanied by the emergence of security challenges related to the transmission of information. Encryption is a good solution. An encryption process is one of the traditional methods to protect the plain text, by converting it into inarticulate form. Encryption implemented can be occurred by using some substitute techniques, shifting techniques, or mathematical operations. This paper proposed a method with two branches to encrypt text. The first branch is a new mathematical model to create and exchange keys, the proposed key exchange method is the development of Diffie-Hellman. It is a new mathematical operations model to exchange keys based on prime num

... Show More
View Publication Preview PDF
Scopus (7)
Scopus Clarivate Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Laser Peening on Aluminum Alloy 7049 Using Black Paint Surface Coating
...Show More Authors

Abstract

Black paint laser peening (bPLP) technique is currently applied for many engineering materials , especially for aluminum alloys due to high improvement in fatigue life and strength . Constant and variable   bending fatigue tests have been performed at RT and stress ratio R= -1 . The results of the present  work observed that the significance of the surface work hardening which generated high negative residual stresses in bPLP specimens .The fatigue life  improvement factor (FLIF)  for bPLP constant fatigue behavior was from 2.543 to 3.3 compared to untreated  fatigue and the increase in fatigue strength at 107 cycle was 21% . The bPLP cumulative fatigue life behav

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Simulation of passively Q-switched rate equation using saturable crystal Dy +2: CaF2 with ruby laser
...Show More Authors

The simulation of passively Q-switching is four non – linear first order differential equations. The optimization of passively Q-switching simulation was carried out using the constrained Rosenbrock technique. The maximization option in this technique was utilized to the fourth equation as an objective function; the parameters, γa, γc and β as were dealt with as decision variables. A FORTRAN program was written to determine the optimum values of the decision variables through the simulation of the four coupled equations, for ruby laser Q–switched by Dy +2: CaF2.For different Dy +2:CaF2 molecules number, the values of decision variables was predicted using our written program. The relaxation time of Dy +2: CaF2, used with ruby was

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Obstacles Avoidance for Mobile Robot Using Enhanced Artificial Potential Field
...Show More Authors

In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 16 2022
Journal Name
Al-khwarizmi Engineering Journal
Comparative study of vibration analysis in rotary shafts between Rayleigh's and Dunkerley's methods
...Show More Authors

The importance of vibrations in rotating rotors in engineering applications has been examined, as has the best approach to interpreting vibration data. The most extensively used analytical approaches for rotating shaft vibration analysis have been investigated. In this research, a detailed study was made of the Rayleigh and Dunkerley methods due to their importance in the special calculations to find the amplitude of vibrations in the rotation system. The multi-node method was used to calculate both Dunkerley's and Rayleigh's methods. An experimental platform was built to study the vibrations that occur in the rotating shafts, and the results were compared with theoretical calculations and with different distances of the bearings. It pro

... Show More
View Publication Preview PDF
Scopus Crossref