Preferred Language
Articles
/
alkej-488
355nm Wavelength Generation of Nd:YAG Laser Using Olive Oil
...Show More Authors

 This project introduces a prospective material for photonic laser applications. The material is olive oil which is classified as organic compound, having a good nonlinear optical properties candidate to be used in photonic applications. A high purity sample of olive oil has been used. The theoretical calculation to generate third harmonic wave using olive oil has been determine using MATLAB program. THG (λ=355nm) intensity has been determined at two cases of sample thicknesses 1mm and 10mm. The minimum threshold incident intensity to obtain THG intensity are equal Iω=7530 mW/cm2 at L=1mm and Iω= 6220 mW/cm2 at L=10mm. The possibility of generation of third harmonic in olive oil inside the cuvette has been experimented using different powers (90-120) mW of CW Nd:YAG laser. The signal of third harmonic generation has been detected using UV-340 Light Meter.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Mar 30 2026
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Adaptive Security Model for Data Protection Using Behavioral User Authentication
...Show More Authors

Credential compromise is one of the most widespread security threats, allowing adversaries to bypass traditional authentication measures and impersonate legitimate users. Traditional intrusion detection systems are often based on network-level or macro-behavioral indicators, which can be easily spoofed by an attacker, thus compromising the effectiveness of those mechanisms. This study presents an improved adaptive intrusion detection system to authenticate user behavior based on micro-digital behavioral profiling. It involves the use of timing of keystrokes, micro-mouse, navigation in the application, and interaction rhythm signatures. The proposed system uses a hybrid model consisting of Long Short-Term Memory (LSTM) sequence predi

... Show More
View Publication
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (19)
Scopus
Publication Date
Thu Nov 25 2021
Journal Name
Engineering And Technology Journal
Pentacene Based Organic Field Effect Transistor Using Different Gate Dielectric
...Show More Authors

This paper presents the electrical behavior of the top contact/ bottom gate of an organic field-effect transistor (OFET) utilizing Pentacene as a semiconductor layer with two distinctive gate dielectric materials Polyvinylpyrrolidone (PVP) and Zirconium oxide (ZrO2) were chosen. The influence of the monolayer and bilayer gates insulator on OFET performance was investigated. MATLAB software was used to simulate and determine the electrical characteristics of a device. The output and transfer characteristics were studied for ZrO2, PVP and ZrO2/PVP as an organic gate insulator layer. Both characteristics show a high drain current at the gate dielectric ZrO2/PVP equal to -0.0031A and -0.0015A for output and transfer characteristics respectively

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Sun Feb 28 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
Intelligent System for Parasitized Malaria Infection Detection Using Local Descriptors
...Show More Authors

Malaria is a curative disease, with therapeutics available for patients, such as drugs that can prevent future malaria infections in countries vulnerable to malaria. Though, there is no effective malaria vaccine until now, although it is an interesting research area in medicine. Local descriptors of blood smear image are exploited in this paper to solve parasitized malaria infection detection problem. Swarm intelligence is used to separate the red blood cells from the background of the blood slide image in adaptive manner. After that, the effective corner points are detected and localized using Harris corner detection method. Two types of local descriptors are generated from the local regions of the effective corners which are Gabor based f

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Feb 20 2024
Journal Name
Baghdad Science Journal
A New Strategy to Modify Hopfield by Using XOR Operation
...Show More Authors

The Hopfield network is one of the easiest types, and its architecture is such that each neuron in the network connects to the other, thus called a fully connected neural network. In addition, this type is considered auto-associative memory, because the network returns the pattern immediately upon recognition, this network has many limitations, including memory capacity, discrepancy, orthogonally between patterns, weight symmetry, and local minimum. This paper proposes a new strategy for designing Hopfield based on XOR operation; A new strategy is proposed to solve these limitations by suggesting a new algorithm in the Hopfield network design, this strategy will increase the performance of Hopfield by modifying the architecture of t

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Oct 10 2016
Journal Name
Iraqi Journal Of Science
Satellite image classification using KL-transformation and modified vector quantization
...Show More Authors

In this work, satellite images classification for Al Chabaish marshes and the area surrounding district in (Dhi Qar) province for years 1990,2000 and 2015 using two software programming (MATLAB 7.11 and ERDAS imagine 2014) is presented. Proposed supervised classification method (Modified Vector Quantization) using MATLAB software and supervised classification method (Maximum likelihood Classifier) using ERDAS imagine have been used, in order to get most accurate results and compare these methods. The changes that taken place in year 2000 comparing with 1990 and in year 2015 comparing with 2000 are calculated. The results from classification indicated that water and vegetation are decreased, while barren land, alluvial soil and shallow water

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Pure And Applied Mathematics
Linear Regression Model Using Bayesian Approach for Iraqi Unemployment Rate
...Show More Authors

In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Jan 02 2012
Journal Name
Journal Of Engineering
3-D Object Recognition using Multi-Wavelet and Neural Network
...Show More Authors

This search has introduced the techniques of multi-wavelet transform and neural network for recognition 3-D object from 2-D image using patches. The proposed techniques were tested on database of different patches features and the high energy subband of discrete multi-wavelet transform DMWT (gp) of the patches. The test set has two groups, group (1) which contains images, their (gp) patches and patches features of the same images as a part of that in the data set beside other images, (gp) patches and features, and group (2) which contains the (gp) patches and patches features the same as a part of that in the database but after modification such as rotation, scaling and translation. Recognition by back propagation (BP) neural network as com

... Show More
View Publication