Preferred Language
Articles
/
ijl-33
Investigation of Densified SiO2 Sol-Gel Thin Films Using Conventional and DPSS Laser Techniques
...Show More Authors

The prepared nanostructure SiO2 thin films were densified by two techniques (conventional and Diode Pumped Solid State Laser (DPSS) (532 nm). X-ray diffraction (XRD), Field Emission Scanning electron microscopy (FESEM), and Atomic Force Microscope (AFM) technique were used to analyze the samples. XRD results showed that the structure of SiO2 thin films was amorphous for both Oven and Laser densification. FESEM and AFM images revealed that the shape of nano silica is spherical and the particle size is in nano range. The small particle size of SiO2 thin film densified by DPSS Laser was (26 nm) , while the smallest particle size of SiO2 thin film densified by Oven was (111 nm).

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Evaluation and Improvement of Manufacturing System Using Computer Software Arena
...Show More Authors

The main purpose of the paper is to identify the controllability of an existing production system; yogurt production line in Abu Ghraib Dairy Factory which has several machines of food processing and packing that has been studied. Through the starting of analysis, instability in production has been found in the factory. The analysis is built depending on experimental observation and data collection for different processing time of the machines, and statistical analysis has been conducted to model the production system. Arena Software is applied for simulating and analyzing the current state of the production system, and results are expanded to improve the system production and efficiency. Research method is applied to contribute in knowi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Oct 09 2021
Journal Name
Applied System Innovation
Design and Optimization of Vertical Axis Wind Turbines Using QBlade
...Show More Authors

Wind energy is considered one of the most important sources of renewable energy in the world, because it contributes to reducing the negative effects on the environment. The most important types of wind turbines are horizontal and vertical axis wind turbines. This work presents the full details of design for vertical axis wind turbine (VAWT) and how to find the optimal values of necessary factors. Additionally, the results shed light on the efficiency and performance of the VAWT under different working conditions. It was taken into consideration the variety of surrounding environmental conditions (such as density and viscosity of fluid, number of elements of the blade, etc.) to simulate the working of vertical wind turbines under di

... Show More
Scopus (23)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Wed Oct 25 2023
Journal Name
2023 Ieee 8th International Conference On Engineering Technologies And Applied Sciences (icetas)
Vibration Characteristics of Perforated Plate using Experimental and Numerical Approaches
...Show More Authors

Vibration analysis plays a vital role in understanding and analyzing the behavior of the structure. Where, it can be utilized from this analysis in the design process of the structures in different engineering applications, check the quality and safety of the structure under different working conditions. This work presents experimental measurements and numerical solutions to an out of plane vibration of a rectangular plate with a circular hole. Free edges rectangular plates with different circular holes diameters were studied. The effects of hole location on the plate natural frequencies were also investigated. A finite element modeling (using ANSYS Software) has been used to analyze the vibration characteristics of the plates. A good agree

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Traumatic Stress Disorders & Treatment
Randomised Controlled Study Comparing Two Psychological Therapies for Posttraumatic Stress Disorder (PTSD): Emotional Freedom Techniques (EFT) vs. Narrative Exposure Therapy (NET)
...Show More Authors

View Publication
Crossref (12)
Crossref
Publication Date
Tue Mar 07 2017
Journal Name
The First International Conference For Engineering Research
Colony Counting Using iPad and iPhone Applications
...Show More Authors

Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Education And Scientific Studies
Studying the effect of laser stress in combination with mannitol on some morphological parameters of cabbage (Brassica oleracea var L. capitata) In vitro
...Show More Authors