
Autorías: Hadeer Idan Ghanim, Ishraq Mahmood. Localización: Revista iberoamericana de psicología del ejercicio y el deporte. Nº. 3, 2021. Artículo de Revista en Dialnet.
In this paper, a construction microwave induced plasma jet(MIPJ) system was used to produce a non-thermal plasma jet at atmospheric pressure, at standard frequency of 2.45 GHz and microwave power of 800 W. The working gas Argon (Ar) was supplied to flow through the torch with adjustable flow rate using flow meter regulator. The influence of the MIPJ parameters such as applied voltage and argon gas flow rate on macroscopic microwave plasma parameters were studied. The macroscopic parameters results show increasing of microwave plasma jet length with increasing of applied voltage, argon gas flow rate where the plasma jet length exceed 12 cm as maximum value. While the increasing of argon gas flow rate will cause increasing into the ar
... Show MoreMany extracted material were used as mouthwash to settle different kinds of oral fungi and bacteria. In this study an extractive of Cyperus rotundus plant E.C.R. which is very active as a mouthwash, was used in concentration range (10-25) ppm in artificial saliva at pH=6.4 and temperature range (288-318) K, to study it’s inhibitory effect on the corrosion of dental amalgam. Potentiostatic and cyclic polarization were used to follow this study. The presence of E.C.R. lead to shift the corrosion potential to the active direction and decreased the corrosion rate to about 98.87%, the inhibition action of E.C.R. resulting from the adsorption of C.R.E. layer between amalgam and saliva as FTIR spectrums shows, where the variety of FTIR adsorptio
... Show MoreStenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.
In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested
... Show MoreThe primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed
... Show MoreThis study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj
... Show MoreWith wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS). The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN. It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show
... Show MoreNow-a-days the Flexible AC Transmission Systems (FACTS) technology is very effective in improving the power flow along the transmission lines and makes the power system more flexible and controllable. This paper deals with the most robust type of FACTS devices; it’s a Unified Power Flow Controller (UPFC). Many cases have been taken to study how the system behaves in the presence and absence of the UPFC under normal and contingency conditions. The UPFC is a device that can be used to improve the bus voltage, increasing the loadability of the line and reduce the active and reactive power losses in the transmission lines, through controlling the flow of real and reactive power. Both the magnitude and the phase angle of th
... Show MoreBentonite is widely used in industrial applications. The present study reports the effect of adding different weights of ZnO to the Iraqi bentonite, on surface area, pore volume and real density. These surface properties were evaluated for pure and modified bentonite. The modification was made by adding different ZnO weights such as; ( 0.5%, 1%, 5%, 10% ). The effect of heat exposing for all modified clay samples at 500 ?C have been also evaluated. The results show that the addition of 0.5% ZnO leads to increase the surface area percentage about 36%, increase pore volume percentage about 5.48% and increase the real density percentage about 27.116%. When the samples exposed to 500 ?C, their surface area and pore volumes have been decreased a
... Show MoreThis paper presents a computer simulation model of a thermally activated roof (TAR) to cool a room using cool water from a wet cooling tower. Modeling was achieved using a simplified 1-D resistance-capacitance thermal network (RC model) for an infinite slab. Heat transfer from the cooling pipe network was treated as 2-D heat flow. Only a limited number of nodes were required to obtain reliable results. The use of 6th order RC-thermal model produced a set of ordinary differential equations that were solved using MATLAB - R2012a. The computer program was written to cover all possible initial conditions, material properties, TAR system geometry and hourly solar radiation. The cool water supply was considered time
... Show More