Preferred Language
Articles
/
bBbdFooBVTCNdQwCtpC9
Single channel informed signal separation using artificial-stereophonic mixtures and exemplar-guided matrix factor deconvolution
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Jun 04 2018
Journal Name
Baghdad Science Journal
Designing and Constructing the Strain Sensor Using Microbend Multimode Fiber
...Show More Authors

The microbend sensor is designed to experience a light loss when force is applied to the sensor. The periodic microbends cause propagating light to couple into higher order modes, the existing higher order modes become unguided modes. Three models of deform cells are fabricated at (3, 5, 8) mm pitchand tested by using MMF and laser source at 850 nm. The maximum output power of (8, 5, 3)mm model is (3, 2.7, 2.55)nW respectively at applied force 5N and the minimum value is (1.9, 1.65, 1.5)nW respectively at 60N.The strain is calculated at different microbend cells ,and the best sensitivity of this sensor for cell 8mm is equal to 0.6nW/N.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
International Journal Of Artificial Intelligence And Mechatronics
Machining Polylines and Ellipses using Three-Axis CNC Milling Machine
...Show More Authors

CNC machine is used to machine complex or simple shapes at higher speed with maximum accuracy and minimum error. In this paper a previously designed CNC control system is used to machine ellipses and polylines. The sample needs to be machined is drawn by using one of the drawing software like AUTOCAD® or 3D MAX and is saved in a well-known file format (DXF) then that file is fed to the CNC machine controller by the CNC operator then that part will be machined by the CNC machine. The CNC controller using developed algorithms that reads the DXF file feeds to the machine, extracts the shapes from the file and generates commands to move the CNC machine axes so that these shapes can be machined.

View Publication Preview PDF
Publication Date
Wed Jan 19 2022
Journal Name
International Journal Of Inventions In Engineering & Science Technology
Biodiversity in the Northern Region using GIS and Remote Sensing
...Show More Authors

Biodiversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity, biological diversity (by developmental factors) environmental factors and environmental factors environmental factors and environmental factors and environmental factors Correlation between biology and the succession of geological and historical factors of living organisms and geological and historical factors to the site and what It is surrounded by natural and tourist attractions and the pursuit of scientific methods in order to advance the studies of biological diversity in the region .

Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Information hiding in digital video using DCT, DWT and CvT
...Show More Authors

The type of video that used in this proposed hiding a secret information technique is .AVI; the proposed technique of a data hiding to embed a secret information into video frames by using Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Curvelet Transform (CvT). An individual pixel consists of three color components (RGB), the secret information is embedded in Red (R) color channel. On the receiver side, the secret information is extracted from received video. After extracting secret information, robustness of proposed hiding a secret information technique is measured and obtained by computing the degradation of the extracted secret information by comparing it with the original secret information via calculating the No

... Show More
Scopus (17)
Scopus
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
Combined DWT and DCT Image Compression Using Sliding RLE Technique
...Show More Authors

A number of compression schemes were put forward to achieve high compression factors with high image quality at a low computational time. In this paper, a combined transform coding scheme is proposed which is based on discrete wavelet (DWT) and discrete cosine (DCT) transforms with an added new enhancement method, which is the sliding run length encoding (SRLE) technique, to further improve compression. The advantages of the wavelet and the discrete cosine transforms were utilized to encode the image. This first step involves transforming the color components of the image from RGB to YUV planes to acquire the advantage of the existing spectral correlation and consequently gaining more compression. DWT is then applied to the Y, U and V col

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 25 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and Evaluation of Ketoprofen Nanosuspension Using Solvent Evaporation Technique
...Show More Authors

 

 

The effective surface area of drug particle is increased by a reduction in the particle size. Since dissolution takes place at the surface of the solute, the larger the surface area, the further rapid is the rate of drug dissolution. Ketoprofen     is class II type drug according to (Biopharmaceutics Classification System BCS) with low solubility and high permeability. The aim of this investigation was to increase the solubility and hence the dissolution rate by the preparation of ketoprofen     nanosuspension using solvent evaporation method. Materials like PVP K30, poloxamer 188, HPMC E5, HPMC E15, HPMC E50, Tween 80 were used as stabilizers in perpetration of differ

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Evaluation and Improvement of Manufacturing System Using Computer Software Arena
...Show More Authors

The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Dec 31 2021
Journal Name
Iraqi Journal Of Laser
Laser Microdrilling and Nanodrilling of 8009 Aluminium Alloy using Nanoparticles
...Show More Authors

 The microdrilling and nanodrilling holes are produced by a Q-switched Nd :YAG laser (1064 nm) interaction with 8009 Al alloy using nanoparticles. Two kinds of nanoparticles were used with this alloy. These nanoparticles are tungsten carbide (WC) and silica carbide (SiC). In this work, the microholes and nanoholes have been investigated with different laser pulse energies (600, 700 and 800)mJ, different repetition rates (5Hz and 10Hz) and different concentration of nanoparticles (90%, 50% and 5% ). The results indicate that  the microholes and nanoholes have been achieved when the laser pulse energy is 600 mJ, laser repetition rate is 5Hz, and the concentration of the  nanoparticles (for the two types of n

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Nuclear Physics A
Determine the 134–140Nd isotopes identity using IBM and NEF
...Show More Authors

TThe property of 134−140Neodymium nuclei have been studied in framework Interacting Boson Model (IBM) and a new method called New Empirical Formula (NEF). The energy positive parity bands of 134−140Nd have been calculated using (IBM) and (NEF) while the negative parity bands of 134−140Nd have been calculated using (NEF) only. The E-GOS curve as a function of the spin (I) has been drawn to determine the property of the positive parity yrast band. The parameters of the best fit to the measured data are determined. The reduced transition probabilities of these nuclei was calculated. The critical point has been determined for 140Nd isotope. The potential energy surfaces (PESs) to the IBM Hamiltonian have been obtained using the intrin

... Show More
View Publication
Scopus (19)
Crossref (18)
Scopus Clarivate Crossref