Preferred Language
Articles
/
mxiKOpYBVTCNdQwCIIJ1
Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Apr 01 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Compared to wireless deployment in areas with different environmentse
...Show More Authors

<p>In the mobile phone system, it is highly desirable to estimate the loss of the track not only to improve performance but also to achieve an accurate estimate of financial feasibility; the inaccurate estimate of track loss either leads to performance degradation or increased cost. Various models have been introduced to accurately estimate the path loss. One of these models is the Okomura / Hata model, which is recommended for estimating path loss in cellular systems that use micro cells. This system is suitable for use in a variety of environments. This study examines the comparison of path loss models for statistical analysis derived from experimental data collected in urban and suburban areas at frequencies of 150-1500 MHz

... Show More
View Publication
Crossref
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
The solar eclipse and its relation with higree months
...Show More Authors

The solar eclipse occurs at short time before the crescent birth moment when the moon near any one of moon orbit nodes It is important to determine the synchronic month which is used to find Higree date. The 'rules' of eclipses are: 

Y= ± 0.997  of Earth radius , the solar eclipse is central and 0.997 < |Y| < 1.026 the umbra cone touch the surface of the Earth, where Y is the least distance from the axis of the moon's shadow to the center of the Earth in units of the equatorial radius of the Earth.

A new model have been designed, depend on the horizontal coordinates of the sun, moon, the distances Earth-Moon (rm), Earth-sun (rs) and |Y| to determine the date and times of total solar eclipse and the geogra

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 01 2025
Journal Name
Results In Engineering
Fatigue performance of asphalt binders modified with varying nanomaterials
...Show More Authors

This study investigates the influence of five nanomaterials nano-alumina (NA), nano-silica (NS), nano-titanium (NT), nano-zinc oxide (NZ), and carbon nanotubes (CNT)on enhancing the fatigue resistance of asphalt binders. NA, NS, and NT were incorporated at dosages of 2%, 4%, 6%, 8%, and 10%, while NZ and CNT were added at 1%, 2%, 3%, 4%, and 5%. A series of physical, rheological, and performance-based tests were conducted, including penetration, softening point, ductility, and rotational viscosity. Based on the outcomes of the overall desirability evaluation, the first three dosages of each nanomaterial were selected for further testing due to their superior workability and binder flexibility. Subsequent investigations included the high-tem

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Mar 03 2025
Journal Name
Internationaljournalof Economicsandfinancestudies
CROSS-SECTIONAL REGRESSION WITH PROXIES: A SEMI-PARAMETRIC METHOD
...Show More Authors

This study investigates asset returns within the Iraq Stock Exchange by employing both the Fama-MacBeth regression model and the Fama-French three-factor model. The research involves the estimation of cross-sectional regressions wherein model parameters are subject to temporal variation, and the independent variables function as proxies. The dataset comprises information from the first quarter of 2010 to the first quarter of 2024, encompassing 22 publicly listed companies across six industrial sectors. The study explores methodological advancements through the application of the Single Index Model (SIM) and Kernel Weighted Regression (KWR) in both time series and cross-sectional analyses. The SIM outperformed the K

... Show More
View Publication
Scopus
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Software Protection by Combining Hash Function with Hardware Identifications
...Show More Authors

This paper presents a hybrid software copy protection scheme, the scheme is applied to
prevent illegal copying of software by produce a license key which is unique and easy to
generate. This work employs the uniqueness of identification of hard disk in personal
computer which can get by software to create a license key after treated with SHA-1 one way
hash function. Two mean measures are used to evaluate the proposed method, complexity
and processing time, SHA-1 can insure the high complexity to deny the hackers for produce
unauthorized copies, many experiments have been executed using different sizes of software
to calculate the consuming time. The measures show high complexity and short execution
time for propos

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Al–bahith Al–a'alami
TV planning and ways to deal with space developments
...Show More Authors

The quote of a Canadian communication scientist (Marshall McLuhan) (“The world has become an electronic village”) has become an archaic information compared to the great and rapid development of communication in the last two decades of the 20th century and what will happen later in the 21st century, to the extent that the world is called, thanks to the internet, a “Small screen” and this fact is a sign of the great progress that has been made in this field. As for the other statement of the Canadian communication scientist mentioned before “the medium itself, is the message”, it has been renewed and developed in its meaning and it’s purpose. Each new technical development in the means of communication necessarily means a me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
Tracked Robot Control with Hand Gesture Based on MediaPipe
...Show More Authors

Hand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jun 30 2012
Journal Name
Al-kindy College Medical Journal
VCAM-1 Expression in Endometerium with Human Cytomegalovirus Infection
...Show More Authors

Background: To elucidate the possible role of human cytomegalovirus in pregnancy loss through induction of certain pro-inflammatory adhesion molecules.
Methods: Paraffin embedded sections of curate samples were obtained from 34 women had spontaneous abortion, and 5 women had elective termination of pregnancy (as control), and then subjected for immunohistochemistry analysis to detect human cytomegalovirus (HCMV) early protein and VCAM-1 molecule.
Results: Nine out of 34 women with spontaneous abortion were positive for HCMV early protein, with a
significantly higher expression of VCAM-1 in HCMV positive cases as compared with HCMV negative and the control groups (p = 0.05, 0.001 respectively).
Conclusion: HCMV infection may p

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 29 2024
Journal Name
Muthanna Journal Of Pure Science
Two-Fold Cryptography: Enhancing Image Security with Henon Map
...Show More Authors

This paper introduces an innovative method for image encryption called "Two-Fold Cryptography," which leverages the Henon map in a dual-layer encryption framework. By applying two distinct encryption processes, this approach offers enhanced security for images. Key parameters generated by the Henon map dynamically shape both stages of encryption, creating a sophisticated and robust security system. The findings reveal that Two-Fold Cryptography provides a notable improvement in image protection, outperforming traditional single-layer encryption techniques.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
A note on an –module with -pure intersection property
...Show More Authors

Let be a ring. Given two positive integers and , an module is said to be -presented, if there is an exact sequence of -modules with is -generated. A submodule of a right -module is said to be -pure in , if for every -Presented left -module the canonical map is a monomorphism. An -module has the -pure intersection property if the intersection of any two -pure submodules is again -pure. In this paper we give some characterizations, theorems and properties of modules with the -pure intersection property.

View Publication
Crossref