Preferred Language
Articles
/
ijp-124
Estimation the blast wave pressure effecters by apply Remote Sensing (RS) and Geographic Information System (GIS) techniques
...Show More Authors

After the year 2003 terrorist attacks knock Baghdad city capital of Iraq using bomb explosion various, shook the nation, and made public resident of Baghdad aware of the need for better ways to protect occupants, assets, and buildings cause the terrorist gangs adopt style burst of blast to injury vulnerability a wider range form, and many structures will suffer damage from air blast when the overpressure concomitant the blast wave, (i.e., the excess over the atmospheric pressure 14.7 pounds per square inch at standard sea level conditions are about one-half pound per square inch or more(
to attainment injury. Then, the distance to which this overpressure level will extend depends primarily on the energy yield (§1.20) of the burst of blast. Accordingly, must been have adopted a changing philosophy to provide appropriate and effective protection for preservation of psyche and building occupants, by establishment of a protected perimeter and the design of a debris mitigating facade, the isolation of internal explosive threats that may to dodge detection through the screening stations or may enter the public spaces prior to screening and the protection of the emergency evacuation, rescue and recovery systems. By reason of this above-mentioned, the study simple contribution of determined phenomena risk containment. Moreover, in this study may be applied remote sensing (RS) and geographic information system (GIS) techniques to estimation the blast wave overpressure of bomb explosive effecters for damage that building of materials (i.e., facade, building glass, secondary of roof, fashioning tools and furniture), and how avoid this problem, therefore, selection justice ministry of Iraq building in Salehyiea region at Baghdad city, it destroyed at 28/10/2009 by motocar bombs explosion.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Mar 30 2025
Journal Name
Mustansiriyah Journal Of Pure And Applied Sciences
Secure E-voting authentication system employing biometric technology, Crypto-Watermarking Approach and blockchain technology: A Review
...Show More Authors

Moderately, advanced national election technologies have improved political systems. As electronic voting (e-voting) systems advance, security threats like impersonation, ballot tampering, and result manipulation increase. These challenges are addressed through a review covering biometric authentication, watermarking, and blockchain technologies, each of which plays a crucial role in improving the security of e-voting systems. More precisely, the biometric authentication is being examined due to its ability in identify the voters and reducing the risks of impersonation. The study also explores the blockchain technology to decentralize the elections, enhance the transparency and ensure the prevention of any unauthorized alteration or

... Show More
View Publication
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Measurement: Sensors
Improved airborne computer system strategy for swarm drones flying based on skybrush suite and inspired technique
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Journal Of Physics: Conference Series
EEG Motor-Imagery BCI System Based on Maximum Overlap Discrete Wavelet Transform (MODWT) and cubic SVM
...Show More Authors
Abstract<p>Communication of the human brain with the surroundings became reality by using Brain- Computer Interface (BCI) based mechanism. Electroencephalography (EEG) being the non-invasive method has become popular for interaction with the brain. Traditionally, the devices were used for clinical applications to detect various brain diseases but with the advancement in technologies, companies like Emotiv, NeuoSky are coming up with low cost, easily portable EEG based consumer graded devices that can be used in various application domains like gaming, education etc as these devices are comfortable to wear also. This paper reviews the fields where the EEG has shown its impact and the way it has p</p> ... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Differential Equations And Dynamical Systems
Stability and Bifurcation in a Prey–Predator–Scavenger System with Michaelis–Menten Type of Harvesting Function
...Show More Authors

View Publication
Scopus (28)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Tue Jan 18 2022
Journal Name
Materials Science Forum
Plasma Jet Prepared Gold and Silver Nanoparticles to Induce Caspase-Independent Apoptosis in Digestive System Cancers
...Show More Authors

Alot of medical and industrial applications used the metal nanoparticles (NPs) with increase interest to be used as cancer therapy. The current work aimed to prepare AuNPs and AgNPs through the use of plasma jet and test their antitumor mechanism of apoptosis induction. The results indicating the face-centered cubic structures and crystalline nature of AuNPs and AgNPs. Also, the image of FESEM showed that the well dispersions regarding AuNPs and AgNPs, while the NP’s spherical shape with the particle size distributions which are considered to be close that estimated from the XRD. cytotoxicity have been assessed against the Normal embryonic cell line REF and the digestive system (HC , SK-GT-4) cell lines under a variety of the seri

... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (16)
Scopus Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
IoT-Based Low-Cost Smart Health Monitoring System using Raspberry Pi Pico W and Blynk Application
...Show More Authors

في السنوات الأخيرة، أدى التقدم التكنولوجي في إنترنت الأشياء (IoT) وأجهزة الاستشعار الذكية إلى فتح اتجاهات جديدة وإعطاء حلول عملية في مختلف قطاعات الحياة. يتم التعرف على إنترنت الأشياء كتنولوجيا حديثة تربط بين مختلف انواع الشبكات. تم تحسين أنواع مختلفة من قطاعات الرعاية الصحية في المجال الطبي بناءً على هذه التكنولوجيا. أحد هذه القطاعات الهامة هو نظام مراقبة الصحة (HMS). تعتبر مراقبة المريض عن بعد لاسلكيًا وبت

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Applied Energy
Solidification enhancement of PCM in a triplex-tube thermal energy storage system with nanoparticles and fins
...Show More Authors

View Publication
Scopus (300)
Crossref (284)
Scopus Clarivate Crossref
Publication Date
Fri Sep 01 2017
Journal Name
International Journal Of Science And Research
Blood Supply of Female Reproductive System of Tytoalba (Barn Owl)
...Show More Authors

Publication Date
Sat Oct 08 2022
Journal Name
Journal Of Computational Design And Engineering
Twisted-fin parametric study to enhance the solidification performance of phase-change material in a shell-and-tube latent heat thermal energy storage system
...Show More Authors
Abstract<p>Phase change material (PCM) is considered as one of the most effective thermal energy storage (TES) systems to balance energy supply and demand. A key challenge in designing efficient PCM-based TES systems lies in the enhancement of heat transmission during phase transition. This study numerically examines the privilege of employing twisted-fin arrays inside a shell-and-tube latent heat storage unit to improve the solidification performance. The presence of twisted fins contributes to the dominating role of heat conduction by their curved shapes, which restricts the role of natural convection but largely aids the overall heat-transfer process during solidification. The heat-discharge </p> ... Show More
View Publication
Scopus (16)
Crossref (8)
Scopus Clarivate Crossref