Preferred Language
Articles
/
ijp-329
Data visualization and distinct features extraction of the comet Ison 2013
...Show More Authors

The distribution of the intensity of the comet Ison C/2013 is studied by taking its histogram. This distribution reveals four distinct regions that related to the background, tail, coma and nucleus. One dimensional temperature distribution fitting is achieved by using two mathematical equations that related to the coordinate of the center of the comet. The quiver plot of the gradient of the comet shows very clearly that arrows headed towards the maximum intensity of the comet.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Materials Chemistry And Physics
Structural, surface electronic bonding, optical, and mechanical features of sputtering deposited CrNiN coatings with Si and Al additives
...Show More Authors

View Publication
Scopus (7)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Chemical Engineering Research And Design
Simultaneous studies of emulsion stability and extraction capacity for the removal of tetracycline from aqueous solution by liquid surfactant membrane
...Show More Authors

View Publication
Scopus (47)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Sun Dec 04 2016
Journal Name
Baghdad Science Journal
Extraction of Iraqi Jasminumsambac (L.)Oil and Study It?s Effect as Antioxidant Agents
...Show More Authors

Key words:Jasminumsambac, Volatile oil, Antioxidant.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 01 2023
Journal Name
The Egyptian Journal Of Hospital Medicine
Production, Extraction, and Purification of An Extracellular Melanin Pigment from Clinically Isolated Pseudomonas aeruginosa
...Show More Authors

Introduction: Melanin is a high-molecular weight pigment produced through the oxidative polymerization of phenolic or indolic compounds and plays a perfect role in UV-light shielding, as well as in photoprotection. Among biopolymers, melanin is unique in many aspects. This study is designed to screen Production, extraction and characterizes of an extracellular melanin pigment from clinically isolated P. aeruginosa. Objective: The aim of the current study is isolation and diagnosis of P.aeruginosa using vitek-2 compact system and screening the ability to produce melanin and characterization of extracted melanin by UV-vis, FTIR, XRD and SEM. Materials and methods: the samples swab inoculated on cetrimide agar as selective media and incubated

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Materials Today: Proceedings
Extraction and mass transfer study of Cupressus sempervirens L. oil by hydro-distillation method
...Show More Authors

The extraction of Cupressus sempervirens L. or cypress essential oil was studied in this paper. This cypress oil was extracted by using the hydro-distillation method, using a clevenger apparatus. Cupressus sempervirens L. leaves were collected from Hit city in Al-Anbar province – Iraq. The influences of three important parameters on the process of oil extraction; water which used as a solvent to the solid ratio (5:1 and 14:1 (ml solvent/g plant), temperature (30 to 100 °C) and processing time, were examined to obtain the best processing conditions to achieve the maximum yield of the essential oil. Also, the mathematical model was described to calculate the mass transfer coefficient. Therefore, the best conditions, that were obtained in

... Show More
Scopus (13)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 04 2011
Journal Name
Baghdad Science Journal
An Embedded Data Using Slantlet Transform
...Show More Authors

Data hiding is the process of encoding extra information in an image by making small modification to its pixels. To be practical, the hidden data must be perceptually invisible yet robust to common signal processing operations. This paper introduces a scheme for hiding a signature image that could be as much as 25% of the host image data and hence could be used both in digital watermarking as well as image/data hiding. The proposed algorithm uses orthogonal discrete wavelet transforms with two zero moments and with improved time localization called discrete slantlet transform for both host and signature image. A scaling factor ? in frequency domain control the quality of the watermarked images. Experimental results of signature image

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 01 2013
Journal Name
2013 Sixth International Conference On Developments In Esystems Engineering
Ensure Security of Compressed Data Transmission
...Show More Authors

Data compression offers an attractive approach to reducing communication costs using available bandwidth effectively. It makes sense to pursue research on developing algorithms that can most effectively use available network. It is also important to consider the security aspect of the data being transmitted is vulnerable to attacks. The basic aim of this work is to develop a module for combining the operation of compression and encryption on the same set of data to perform these two operations simultaneously. This is achieved through embedding encryption into compression algorithms since both cryptographic ciphers and entropy coders bear certain resemblance in the sense of secrecy. First in the secure compression module, the given text is p

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref