Preferred Language
Articles
/
joe-1194
A Study of Fluctuation and Expansion Ratios for Gas-Solid Fluidized Columns
...Show More Authors

The fluctuation and expansion ratios have been studied for cylindrical gas-solid fluidized columns by using air as fluidizing medium and Paracetamol as the bed material. The variables were the column diameter (0.0762, 0.15, and 0.18 m), static bed height (0.05, 0.07, and 0.09 m), and air velocity to several times of minimum fluidization velocity. The results showed that both the fluctuation and expansion ratios had a direct relation with air velocity and an inverse one with column diameter and static bed height. A good agreement was between the experimental results and the calculated values by using the correlation equations from the literature.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Dec 31 2010
Journal Name
International Journal Of Advancements In Computing Technology
A proposed Technique for Information Hiding Based on DCT
...Show More Authors

The aim of this work is to design an algorithm which combines between steganography andcryptography that can hide a text in an image in a way that prevents, as much as possible, anysuspicion of the hidden textThe proposed system depends upon preparing the image data for the next step (DCT Quantization)through steganographic process and using two levels of security: the RSA algorithm and the digitalsignature, then storing the image in a JPEG format. In this case, the secret message will be looked asplaintext with digital signature while the cover is a coloured image. Then, the results of the algorithmare submitted to many criteria in order to be evaluated that prove the sufficiency of the algorithm andits activity. Thus, the proposed algorit

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Tue Jan 01 2008
Journal Name
2008 15th Asia-pacific Software Engineering Conference
G2Way A Backtracking Strategy for Pairwise Test Data Generation
...Show More Authors

View Publication
Scopus (16)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Mon Dec 03 2018
Journal Name
Journal Of Engineering
Variable Structure Control Design for a Magnetic Levitation System
...Show More Authors

In this paper the variable structure control theory is utilized to derive a discontinuous controller to the magnetic levitation system. The magnetic levitation system model is considered uncertain, which subjected to the uncertainty in system parameters, also it is open-loop unstable and strongly nonlinear. The proposed variable structure control to magnetic levitation system is proved, and the area of attraction is determined. Additionally, the chattering, which induced due to the discontinuity in control law, is attenuated by using a non-smooth approximate. With this approximation the resulted controller is a continuous variable structure controller with a determined steady state error according to the selected control

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Journal Of King Saud University - Science
A semi-analytical iterative technique for solving chemistry problems
...Show More Authors

View Publication
Crossref (19)
Crossref
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
Borrowing in a diwan Moon Tree for Nazik Angels
...Show More Authors

The moon tree, the lover of the night, cholera, the sea changes its colors are poetic products left by the pioneer of free poetry, as many have called her. She used to write poetry and publish it in magazines and newspapers until she published it with collections that came into existence from an early age. Several factors helped her in that that contributed to the formation of her personality and the maturity of her talent, including factors Family, including environmental, and psychological, until she later became the focus of attention of many, so she became taught in the universities of London, and students stood by her method of writing free poetry, this poetic color that Badr Shaker Al-Sayyab participated in pioneering. Whoever exam

... Show More
View Publication Preview PDF
Publication Date
Thu May 17 2012
Journal Name
Eurasip Journal On Wireless Communications And Networking
A cluster-based proxy mobile IPv6 for IP-WSNs
...Show More Authors

View Publication
Scopus (36)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Tue Jul 30 2024
Journal Name
Academia Open
Positioning Preterm Newborns for Cardiorespiratory Stability A Global Insight
...Show More Authors

Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Variant Domination Types for a Complete h-ary Tree
...Show More Authors

Graph  is a tool that can be used to simplify and solve network problems. Domination is a typical network problem that graph theory is well suited for. A subset of nodes in any network is called dominating if every node is contained in this subset, or is connected to a node in it via an edge. Because of the importance of domination in different areas, variant types of domination have been introduced according to the purpose they are used for. In this paper, two domination parameters the first is the restrained and the second is secure domination have been chosn. The secure domination, and some types of restrained domination in one type of trees is called complete ary tree  are determined.

View Publication Preview PDF
Scopus (19)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Jul 06 2022
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Pixel Based Techniques for Gray Image Compression: A review
...Show More Authors

Currently, with the huge increase in modern communication and network applications, the speed of transformation and storing data in compact forms are pressing issues. Daily an enormous amount of images are stored and shared among people every moment, especially in the social media realm, but unfortunately, even with these marvelous applications, the limited size of sent data is still the main restriction's, where essentially all these applications utilized the well-known Joint Photographic Experts Group (JPEG) standard techniques, in the same way, the need for construction of universally accepted standard compression systems urgently required to play a key role in the immense revolution. This review is concerned with Different

... Show More
View Publication
Crossref (1)
Crossref