Preferred Language
Articles
/
alkej-594
A New Fractal Printed Dipole Antenna Based on Tent Transformations for Wireless Communication Applications
...Show More Authors

In this paper, a compact multiband printed dipole antenna is presented as a candidate for use in wireless communication applications. The proposed fractal antenna design is based on the second level tent transformation. The space-filling property of this fractal geometry permits producing longer lengths in a more compact size. Theoretical performance of this antenna has been calculated using the commercially available software IE3D from Zeland Software Inc. This electromagnetic simulator is based on the method of moments (MoM). The proposed dipole antenna has been found to possess a considerable size reduction compared with the conventional printed or wire dipole antenna designed at the same design frequency and using the same substrate specifications. Results have shown that the proposed design possesses a multi-band resonant behavior with adequate radiation performance with VSWR ≤ 2 (return loss ≤-10 dB) throughout the resonating bands. This makes the presented antenna (or its monopole counterpart) suitable for use in the modern multi-functions compact communication systems. 

              

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Journal Of The College Of Education For Women
Peace Indicating Words in Pre- Islamic Poetry
...Show More Authors

In pre- Islamic poetry, there are a lot of words that indicate
peacefulness of one sort of another, in addition to the inspirations of semantic
modeling in which the poet sets himself in various horizons.
Among these words: brother, comrade, friend, companion, lover,
people, prince, home, land, country, blessing, honesty, contract, company,
justice, thankfulness, forgiveness, pardoning, guest, goodness, faithfulness,
silence, death, peace,….
In addition, there are their derivatives from various aspects that indicate
peacefulness either directly or indirectly.

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Applied Surface Science
Sol-gel derived ITO-based bi-layer and tri-layer thin film coatings for organic solar cells applications
...Show More Authors

View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Watermark Based on Singular Value Decomposition
...Show More Authors

Watermarking operation can be defined as a process of embedding special wanted and reversible information in important secure files to protect the ownership or information of the wanted cover file based on the proposed singular value decomposition (SVD) watermark. The proposed method for digital watermark has very huge domain for constructing final number and this mean protecting watermark from conflict. The cover file is the important image need to be protected. A hidden watermark is a unique number extracted from the cover file by performing proposed related and successive operations, starting by dividing the original image into four various parts with unequal size. Each part of these four treated as a separate matrix and applying SVD

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
A steganography based on orthogonal moments
...Show More Authors

View Publication
Scopus (24)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Programmable System for Failure Modes and Effect Analysis of Steam-Power Plant Based on the Fault Tree Analysis
...Show More Authors

In this paper, the system of the power plant has been investigated as a special type of industrial systems, which has a significant role in improving societies since the electrical energy has entered all kinds of industries, and it is considered as the artery of modern life.

   The aim of this research is to construct a programming system, which could be used to identify the most important failure modes that are occur in a steam type of power plants. Also the effects and reasons of each failure mode could be analyzed through the usage of this programming system reaching to the basic events (main reasons) that causing each failure mode. The construction of this system for FMEA is dependi

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Survey Smoothly Fiber-Wireless (FiWi) Accessing Wireless Networks: Convergence and Challenges
...Show More Authors

<p> Traditionally, wireless networks and optical fiber Networks are independent of each other. Wireless networks are designed to meet specific service requirements, while dealing with weak physical transmission, and maximize system resources to ensure cost effectiveness and satisfaction for the end user. In optical fiber networks, on the other hand, search efforts instead concentrated on simple low-cost, future-proofness against inheritance and high services and applications through optical transparency. The ultimate goal of providing access to information when needed, was considered significantly. Whatever form it is required, not only increases the requirement sees technology convergence of wireless and optical networks but

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Synthesis, Characterization and Antioxidant Activity of New Azo Ligand and Some Metal Complexes of Tryptamine Derivatives
...Show More Authors

 

Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of study. Write a brief abstract about your paper’s subject of

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Crossref