Preferred Language
Articles
/
bsj-1079
Design and Testing a Neutrons and Gamma-Rays Multilayer Shield Using Different Groups of Cross – Sections
...Show More Authors

A preventing shield for neutrons and gamma rays was designed using alternate layers of water and iron with pre-fixed dimensions in order to study the possibility of attenuating both neutrons and gamma-rays. ANISN CODE was prepared and adapted for the shield calculation using radiation doses calculation: Two groups of cross-section were used for each of neutrons and gamma-rays that rely on the one – dimensional transport equation using discrete ordinate's method, and through transforming cross-section values to values that are independent on the number of groups. The memory size required for the applied code was reduced and the results obtained were in agreement with those of standard acceptable document samples of cross –section, this assists the possibility of using this program for calculation of shields and adopting the shield design shield in this research for shielding from neutron and gamma-rays because the calculation of this designed proved the possibility of efficient attenuation of both of these kinds of radiations through from this theoritical study.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 30 2024
Journal Name
Al-qadisiyah Journal For Engineering Sciences
Investigation of an automobile air-conditioner with a liquid-suction heat exchanger using R134a and R1234yf
...Show More Authors

Air-conditioning systems (ACs) are essential in hot and humid climates to ensure acceptable ambient air quality as well as thermal comfort for buildings users. It is essential to improve refrigeration system performance without increasing the effects of global warming potential (GWP) and ozone depletion potential (ODP). The main objective of this study is to evaluate the performance of an air conditioning system that operates with a liquid suction heat exchanger (LSHX) through implementing refrigerants with zero OPD and low GWP (i.e., R134a and R1234yf). Liquid suction heat exchanger (LSHX) was added to an automobile air conditioning system (AACS).When Liquid suction heat exchanger was added to the cycle, primary results indicated t

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 01 2018
Journal Name
Case Studies In Thermal Engineering
The temperatures distributions of a single-disc clutches using heat partitioning and total heat generated approaches
...Show More Authors

View Publication
Scopus (40)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Sun Jun 03 2012
Journal Name
Baghdad Science Journal
Batch and Flow-Injection Spectrophotometric Determination of Thymol Using Procaine Hydrochloride as a New Chromogenic Reagent
...Show More Authors

New, simple and sensitive batch and Flow-injecton spectrophotometric methods for the determination of Thymol in pure form and in mouth wash preparations have been proposed in this study. These methods were based on a diazotization and coupling reaction between Thymol and diazotized procaine HCl in alkaline medium to form an intense orange-red water-soluble dye that is stable and has a maximum absorption at 474 nm. A graphs of absorbance versus concentration show that Beer’s law is obeyed over the concentration range of 0.4-4.8 and 4-80 µg.ml-1 of Thymol, with detection limits of 0.072 and 1.807 µg.ml-1 of Thymol for batch and FIA methods respectively. The FIA procedure sample throughput was 80 h-1. All different chemical and physical e

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Development and in vitro Evaluation of Bioadhesive Vaginal Tablet using Econazole Nitrate as a Model Drug
...Show More Authors

         In this study, a bioadhesive dosage form of eoconazole nitrate for vaginal delivery was designed using a combination of bioadhesive polymers: Carbopol 941 p and sodium carboxymethylcellulose or methylcellulose in different ratios. The bioadhesive strength was evaluated by measuring the force required to detach the tablet from sheep vaginal mucosal membrane. It was found that the bioadhesive force was directly proportional to Carbopol 941 p content in the different formulae. The formulae were tested for their swelling behavior using agar gel plate method. The results showed that formulae containing a combination of Carbopol 941 p and sodium carboxymethylcellulose had greater swelling index

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (16)
Scopus Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Baghdad Science Journal
Building a Statistical Model to Detect Foreground Objects and using it in Video Steganography
...Show More Authors

Video steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
...Show More Authors

Secure storage of confidential medical information is critical to healthcare organizations seeking to protect patient's privacy and comply with regulatory requirements. This paper presents a new scheme for secure storage of medical data using Chaskey cryptography and blockchain technology. The system uses Chaskey encryption to ensure integrity and confidentiality of medical data, blockchain technology to provide a scalable and decentralized storage solution. The system also uses Bflow segmentation and vertical segmentation technologies to enhance scalability and manage the stored data. In addition, the system uses smart contracts to enforce access control policies and other security measures. The description of the system detailing and p

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (12)
Crossref (6)
Scopus Clarivate Crossref