Preferred Language
Articles
/
_ha3CYoBVTCNdQwCF496
Highly sensitive fiber Bragg grating based gas sensor integrating polyaniline nanofiber for remote monitoring
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Sep 01 2018
Journal Name
J Of Baghdad College Of Dentistry
Serum Tumor Necrosis Factor Alpha and High Sensitive C-Reactiveprotein as Biomarkersin Periodontitis in Iraqi Patients with Osteoarthritis
...Show More Authors

Publication Date
Sat Dec 17 2022
Journal Name
Iraqi Journal Of Laser
PDF Design Optical BPF Using Double Clad Fiber MZI for Free Space Optical Communication: Mohanad G. Khamees , Tahreer S. Mansour*
...Show More Authors

Abstract: A novel design of Mach Zehnder Interferometer (MZI) in terms of using special type of optical fiber that has double clad with graded distribution of the refractive index that can be easily implemented practically was suggested and simulated in this work. The suggested design is compact, rapid, and is simple to be modified and tested. The simulated design contains a MZI of 1546.74 nm of central wavelength that is constructed using special type of double clad optical fiber that has two different numerical apertures. The first aperture will supply single mode propagation via its core, while the second numerical aperture supports a zigzag wave propagation (multimode) in the first clad region. The interferometer’s

... Show More
View Publication Preview PDF
Publication Date
Thu Oct 23 2025
Journal Name
Baghdad Science Journal
New Mode for 4 mm Path Irradiation and One Side Detection at 0–180° for Cu (II)ion Determination in Different Samples using On-Line Continuous Flow Feed and Simplified, Sensitive, and Portable Photometer
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sat Feb 14 2026
Journal Name
Karbala Journal Of Physical Education Sciences
Training of different ranges using the (HC-SR04 ultrasonic sensor ) and its effect in developing some of special abilities for young boxers
...Show More Authors

View Publication
Publication Date
Fri May 15 2009
Journal Name
Journal Of Planner And Development
Study of Change in Regional Land Use Using Remote Sensing Technology and Geographic Information Systems / Study Area (Hawr Al Huweiza) for the Years 1973-1990-2004
...Show More Authors

 

his project try to explain the using ability of spatial techniques for land cover change detection on regional level with the time parameter and did select for explain these abilities study case (Hewaizah marsh ) . this area apply to many big changes with the time. These changes made action on characters and behaviors of this area as well as all activities in it . This Project concerting to recognize the Using importance of remote sensing and GIS Methodology in data collecting for the changes of land use and the methodology for the analyses and getting the results for the next using as a base data for development and drawing the plans as well as in regional planning .This project focus on practical

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Engineering
A Signal Amplification-based Transceiver for Visible Light Communication
...Show More Authors

Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref