Preferred Language
Articles
/
ijl-18
Laser Detection and Tracking System Using an Array of Photodiodes with Fuzzy Logic controller
...Show More Authors

In this work laser detection and tracking system (LDTS) is designed and implemented using a fuzzy logic controller (FLC). A 5 mW He-Ne laser system and an array of nine PN photodiodes are used in the detection system. The FLC is simulated using MATLAB package and the result is stored in a lock up table to use it in the real time operation of the system. The results give a good system response in the target detection and tracking in the real time operation.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Apr 25 2012
Journal Name
Journal Of Chromatographic Science
Direct Acetylation and Determination of Chlorophenols in Aqueous Samples by Gas Chromatography Coupled with an Electron-Capture Detector
...Show More Authors

A method was developed that offers a rapid, simple and accurate technique for the determination of chlorophenols at trace levels in aqueous samples with very limited volumes of organic solvents. These compounds were acetylated, then preliminarily extracted with n-hexane. The enriched chlorophenols were directly analyzed using gas chromatography with an electron-capture detector. The detection limits were in the range of 0.001–0.005 mg/L, except for 2-chlorophenol, which was always above 0.013 mg/L. Relative standard deviation for the spiked water samples ranged from 2.2 to 6.1%, while relative recoveries were in the range of 67.1 to 101.3%.

View Publication
Scopus (15)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Oct 16 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Impairment of Salivary Gland Function in Rheumatoid Arthritis: Association with Change in Salivary Biomarkers and Disease Activity
...Show More Authors

Background: Rheumatoid arthritis is a chronic inflammatory autoimmune disease characterized by joint inflammation, involvement of exocrine salivary and lacrimal glands may occur as extra-articular mani¬festations in this disease. This study aimed to provide evidence of altered in function and composition of salivary gland in patients with rheumatoid arthritis by determine salivary flow rate and some biochemical parameters(total protein, amylase, peroxidase) and to investigate the relationship between disease activity and changes in function and composition of salivary gland. Materials and Methods: Fifty five patients with RA (7 males and 48 females) were enrolled in this study with age range (20-69) years. The patients were separated int

... Show More
View Publication Preview PDF
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental Study of Mixed Convection in an Enclosure with a Cold Movable Top Wall and Hot Bottom Wall
...Show More Authors

 

Mixed convection heat transfer to air inside an enclosure is investigated experimentally. The bottom wall of the enclosure is maintained at higher temperature than that of the top wall which keeps in oscillation motion, whereas the left and right walls are well insulated. The differential temperature of the bottom and top walls changed several times in order to accurately characterize the temperature distribution over a considerable range of Richardson number. Adjustable aspect ratio box was built as a test rig to determine the effects of Richardson number and aspect ratio on the flow behavior of the air inside the enclosure. The flow fields and the average Nusselt number profiles were presented in this wo

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Communications In Computer And Information Science
Audio Compression Using Transform Coding with LZW and Double Shift Coding
...Show More Authors

Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Wasit Journal Of Engineering Sciences
Analysis attackers’ methods with hashing secure password using CSPRNG and PBKDF2
...Show More Authors

Using the Internet, nothing is secure and as we are in need of means of protecting our data, the use of passwords has become important in the electronic world. To ensure that there is no hacking and to protect the database that contains important information such as the ID card and banking information, the proposed system stores the username after hashing it using the 256 hash algorithm and strong passwords are saved to repel attackers using one of two methods: -The first method is to add a random salt to the password using the CSPRNG algorithm, then hash it using hash 256 and store it on the website. -The second method is to use the PBKDF2 algorithm, which salts the passwords and extends them (deriving the password) before being ha

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Mar 18 2020
Journal Name
Baghdad Science Journal
Solving Linear Volterra – Fredholm Integral Equation of the Second Type Using Linear Programming Method
...Show More Authors

In this paper, a new technique is offered for solving three types of linear integral equations of the 2nd kind including Volterra-Fredholm integral equations (LVFIE) (as a general case), Volterra integral equations (LVIE) and Fredholm integral equations (LFIE) (as special cases). The new technique depends on approximating the solution to a polynomial of degree  and therefore reducing the problem to a linear programming problem(LPP), which will be solved to find the approximate solution of LVFIE. Moreover, quadrature methods including trapezoidal rule (TR), Simpson 1/3 rule (SR), Boole rule (BR), and Romberg integration formula (RI) are used to approximate the integrals that exist in LVFIE. Also, a comparison between those

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 25 2017
Journal Name
Biomedical And Pharmacology Journal
Diode Laser Versus Scalpel Gingivectomy
...Show More Authors

Background: different methods can be used to remove tissue during gingivectomy and produce a good gingival margin, the most common is the conventional gingivectomy which is done by the use of scalpel, now a day’s Laser is widely spread and can be used to perform surgeries. Materials and methods: 50 patients divided into two equal groups, Group 1 gingivectomy was done by Diode Laser, Group 2 gingivectomy was done by scalpel, plaque and gingival index were measured at 1st, 2nd and 3rd visit, swab were taken and sent foe detecting bacterial growth and biopsy were taken for histopathological examination. Group 1 show no significant differences in plaque and gingival means between the visits, the bacteriological examination showed no growth of

... Show More
View Publication
Crossref (8)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Biomedical & Pharmacology Journal
Diode Laser Versus Scalpel Gingivectomy
...Show More Authors

Different methods can be used to remove tissue during gingivectomy and produce a good gingival margin, the most common is the conventional gingivectomy which is done by the use of scalpel, now a day’s Laser is widely spread and can be used to perform surgeries. Materials and methods: 50 patients divided into two equal groups, Group 1 gingivectomy was done by Diode Laser, Group 2 gingivectomy was done by scalpel, plaque and gingival index were measured at 1st, 2nd and 3rd visit, swab were taken and sent foe detecting bacterial growth and biopsy were taken for histopathological examination. Group 1 show no significant differences in plaque and gingival means between the visits, the bacteriological examination showed no growth of bact

... Show More
Publication Date
Tue Jan 01 2019
Journal Name
Technologies And Materials For Renewable Energy, Environment And Sustainability: Tmrees19gr
Superconductor enhancements by laser irradiations
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref