Preferred Language
Articles
/
ijl-116
Experimental Investigation of a Laser Wireless Video Communication System Using Intensity Modulated /Direct Detection Technique
...Show More Authors

In this work Laser wireless video communication system using intensity modualtion direct
detection IM/DD over a 1 km range between transmitter and receiver is experimentally investigated and
demonstrated. Beam expander and beam collimeter were implemented to collimete laser beam at the
transmitter and focus this beam at the receiver respectively. The results show that IM/DD communication
sysatem using laser diode is quite attractive for transmitting video signal. In this work signal to noise
ratio (S/N) higher than 20 dB is achieved in this work.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Case Studies In Chemical And Environmental Engineering
Removal of copper from a simulated wastewater by electromembrane extraction technique using a novel electrolytic cell provided with a flat polypropylene membrane infused with 1-octanol and DEHP as a carrier
...Show More Authors

View Publication
Scopus (8)
Crossref (9)
Scopus Crossref
Publication Date
Mon Feb 18 2019
Journal Name
Iraqi Journal Of Physics
Relative intensity distribution in the rotational structure for B1Σ+- A1Π and B1Σ+- X1Σ+ electronic systems of BeO molecule
...Show More Authors

Theoretical spectroscopic study of  Beryllium Oxide has been carried out, Boltzmann distribution of P, Q and R branches in the range of (0<J<13) at temperature 4200K for (0-0) band for electronic transitions B1Σ+-A1Π and B1Σ-X1Σ. The Boltzmann distribution of these branches has a maximum values at equal J approximately while the values of relative population are different. For the B1Σ+- X1Σ+ transition the branch's lines extend towards lower wavenumber. This is because (Bv'-Bv") value is negative, i.e  Bv'< Bv" For B1Σ+-A1Π

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 15 2018
Journal Name
Al-khwarizmi Engineering Journal
Bioremediation of Soil Contaminated with Diesel using Biopile system
...Show More Authors

This study was focused on biotreatment of soil which polluted by petroleum compounds (Diesel) which caused serious environmental problems. One of the most effective and promising ways to treat diesel-contaminated soil is bioremediation. It is a choice that offers the potential to destroy harmful pollutants using biological activity. The capability of mixed bacterial culture was examined to remediate the diesel-contaminated soil in bio piling system. For fast ex-situ treatment of diesel-contaminated soils, the bio pile system was selected. Two pilot scale bio piles (25 kg soil each) were constructed containing soils contaminated with approximately 2140 mg/kg total petroleum hydrocarbons (TPHs). The amended soil: (contaminated soil with the a

... Show More
Crossref (4)
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Simulation based comparison of routing protocols in wireless multihop adhoc networks
...Show More Authors

Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz

... Show More
View Publication
Crossref (13)
Crossref
Publication Date
Thu Feb 01 2024
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Wireless channel-based ciphering key generation: effect of aging and treatment
...Show More Authors

Key generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Sealing Depth of Q-Switched Nd:YAG 1064nm Laser in the Treatment of Patients with Hypersensitive Teeth: An In Vitro Study
...Show More Authors

The purpose of this work was to study the effects of the Nd:YAG laser on exposed dentinal
tubules of human extracted teeth using a scanning electron microscope (SEM). Eighty 2.5mm-thick
slices were cut at the cementoenamel junction from 20 extracted human teeth with an electric saw. A
diamond bur was used to remove the cementum layer to expose the dentinal tubules. Each slice was
sectioned into four equal quadrants and the specimens were randomly divided into four groups (A to D ).
Groups B to D were lased for 2 mins using an Nd:YAG laser at 6 pulses per second at energy outputs of
80 , 100 and 120 mJ. Group A served as control. Under SEM observation, nonlased specimens showed
numerous exposed dentinal tubules. SEM o

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Removal of Fluoride Ions from Wastewater Using Green and Blue-green Algae Biomass in a Fluidized Bed System
...Show More Authors

The removal of fluoride ions from aqueous solution onto algal biomass as biosorbent in batch and continuous fluidized bed systems was studied. Batch system was used to study the effects of process parameters such as, pH (2-3.5), influent fluoride ions concentration (10- 50 mg/l), algal biomass dose (0–1.5 g/ 200 ml solution), to determine the best operating conditions. These conditions were pH=2.5, influent fluoride ions concentration= 10 mg/l, and algal biomass dose=3.5 mg/l. While, in continuous fluidized bed system, different operating conditions were used; flow rate (0.667- 0.800 l/min), bed depth (8-15 cm) corresponded to bed weight of (80- 150 g). The results show that the breakthrough time increases with the inc

... Show More
View Publication Preview PDF
Publication Date
Tue Apr 02 2024
Journal Name
Al-iraqia Journal Of Scientific Engineering Research
Prioritise Five Tafseer Translators Using Clustering Technique for Surah Al-Baqarah
...Show More Authors

View Publication Preview PDF
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Sat Jun 01 2019
Journal Name
Journal Of Engineering And Applied Sciences
Enhancing LSB algorithm against brute-force attack using ASCII mapping technique
...Show More Authors