Preferred Language
Articles
/
WBeQP48BVTCNdQwCzWbS
A Novel Classification Method with Cubic Spline Interpolation
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Optik
Assessing the optoelectronic performance of d-orbital doped cubic HfO2: The case of W, Nb, and Mo
...Show More Authors

This contribution provides an atomistic understanding into the impact of W, Nb, and Mo co-substitution at Hf-site of cubic HfO2 lattice to produce Hf1−xTMxO2 system at x = 25%. The calculations have been performed under the framework of density functional theory supported by Habbured parameter (DFT+U). Structural analysis demonstrates that the recorded lattice constants is in good coherence with the previously published results. For the lattice parameters, contraction by 1.33% comparing with the host system has been reported. Furthermore, the doping effect of TM on the band gap leads to its reduction in the resulting Hf0.75TM0.25O2 configurations. The partial density of states (PDOS) indicate that hybridization through localized electroni

... Show More
Publication Date
Fri Jan 09 2026
Journal Name
Journal Of Engineering
Calculation Of Volumeteric And Thermodynamic Properties For Pure Hydrocarbons And Their Mixtures Using Cubic Equations Of State
...Show More Authors

View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Optik
Assessing the optoelectronic performance of d-orbital doped cubic HfO2: The case of W, Nb, and Mo
...Show More Authors

This contribution provides an atomistic understanding into the impact of W, Nb, and Mo co-substitution at Hf-site of cubic HfO2 lattice to produce Hf1−xTMxO2 system at x = 25%. The calculations have been performed under the framework of density functional theory supported by Habbured parameter (DFT+U). Structural analysis demonstrates that the recorded lattice constants is in good coherence with the previously published results. For the lattice parameters, contraction by 1.33% comparing with the host system has been reported. Furthermore, the doping effect of TM on the band gap leads to its reduction in the resulting Hf0.75TM0.25O2 configurations. The partial density of states (PDOS) indicate that hybridization through localized electroni

... Show More
View Publication
Scopus (9)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

View Publication Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Aug 14 2018
Journal Name
International Journal Of Engineering & Technology
Hybrid DWT-DCT compression algorithm & a new flipping block with an adaptive RLE method for high medical image compression ratio
...Show More Authors

Huge number of medical images are generated and needs for more storage capacity and bandwidth for transferring over the networks. Hybrid DWT-DCT compression algorithm is applied to compress the medical images by exploiting the features of both techniques. Discrete Wavelet Transform (DWT) coding is applied to image YCbCr color model which decompose image bands into four subbands (LL, HL, LH and HH). The LL subband is transformed into low and high frequency components using Discrete Cosine Transform (DCT) to be quantize by scalar quantization that was applied on all image bands, the quantization parameters where reduced by half for the luminance band while it is the same for the chrominance bands to preserve the image quality, the zig

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Woman’s Identity Crisis in the Clash of Cultures: A Study of Betool Khedairi’s Novel: A Sky So close
...Show More Authors

This paper is an attempt to clarify the impact of Postcolonialism, one of the most
challenging fields of study that has emerged in recent years, on representations of women in
once-colonised countries and in Western locations. It discusses the influence of cultural
differences on the status and identity of a woman who experience ‗multiculturalism‘. The
study is an analytical reading of a contemporary novel written by the Iraqi writer Betool Al-
Kudairi. The emphasis lies on the clash between two different cultures and traditions
represented by the British mother and the Iraqi father and its effect on the life and identity of
the protagonist. The main focus is on idea of ‗hybrid identity‘ and the absence of th

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 01 2012
Journal Name
Ijcsi International Journal Of Computer Science
Implementing a novel approach an convert audio compression to text coding via hybrid technique
...Show More Authors

Compression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref