Preferred Language
Articles
/
xBdjbI4BVTCNdQwCRUdC
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Sep 29 2025
Journal Name
Journal Of Al-ma'moon College
The Rules of Conduct for Cultivated Ladies in Jane Austen's Time
...Show More Authors

There is no doubt that Jane Austen is one of the most studied authors of the late 18th and early 19th centuries. Her female characters have been extensively studied and they seem to have aroused much interest as manifestations of the conduct of their time. Her heroines have realized that there were many mistakes in the rules of conduct that controlled and restricted their behaviors. Thus, they have found no fault in correcting these mistakes, by behaving naturally without acting. Elizabeth Bennet the heroine of Pride and Prejudice and Marianne Dashwood of Sense and Sensibility are the chosen examples of that kind of women.

View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Indian Journal Of Forensic Medicine And Toxicology
Color stability of different aesthetic resin composite materials: A digital image analysis
...Show More Authors

Scopus (2)
Scopus
Publication Date
Sat Jan 25 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Color Stability of Different Aesthetic Resin Composite Materials: A Digital Image Analysis
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Engineering And Technology Journal
Text File Hiding Randomly Using Secret Sharing Scheme
...Show More Authors

Exchange of information through the channels of communication can be unsafe. Communication media are not safe to send sensitive information so it is necessary to provide the protection of information from disclosure to unauthorized persons. This research presented the method to information security is done through information hiding into the cover image using a least significant bit (LSB) technique, where a text file is encrypted using a secret sharing scheme. Then, generating positions to hiding information in a random manner of cover image, which is difficult to predict hiding in the image-by-image analysis or statistical analyzes. Where it provides two levels of information security through encryption of a text file using the secret sha

... Show More
View Publication
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Trends In Network And Communications
Header Compression Scheme over Hybrid Satellite-WiMAX Network
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Mon Sep 01 2008
Journal Name
Al-khwarizmi Engineering Journal
New Adaptive Data Transmission Scheme Over HF Radio
...Show More Authors

Acceptable Bit Error rate can be maintained by adapting some of the design parameters such as modulation, symbol rate, constellation size, and transmit power according to the channel state.

An estimate of HF propagation effects can be used to design an adaptive data transmission system over HF link. The proposed system combines the well known Automatic Link Establishment (ALE) together with variable rate transmission system. The standard ALE is modified to suite the required goal of selecting the best carrier frequency (channel) for a given transmission. This is based on measuring SINAD (Signal plus Noise plus Distortion to Noise plus Distortion), RSL (Received Signal Level), multipath phase distortion and BER (Bit Error Rate) fo

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Improving Fractal Image Compression Scheme through Quantization Operation
...Show More Authors

We explore the transform coefficients of fractal and exploit new method to improve the compression capabilities of these schemes. In most of the standard encoder/ decoder systems the quantization/ de-quantization managed as a separate step, here we introduce new way (method) to work (managed) simultaneously. Additional compression is achieved by this method with high image quality as you will see later.

View Publication Preview PDF
Crossref
Publication Date
Tue Aug 01 2017
Journal Name
Catalysis Science & Technology
Decomposition of selected chlorinated volatile organic compounds by ceria (CeO 2)
...Show More Authors

Chlorinated volatile organic compounds (CVOCs) are toxic chemical entities emitted invariably from stationary thermal operations when a trace of chlorine is present. Replacing the high-temperature destruction operations of these compounds with catalytic oxidation has led to the formulation of various potent metal oxides catalysts; among them are ceria-based materials. Guided by recent experimental measurements, this study theoretically investigates the initial steps operating in the interactions of ceria surface CeO2(111) with three CVOC model compounds, namely chloroethene (CE), chloroethane (CA) and chlorobenzene (CB). We find that, the CeO2(111) surface mediates fission of the carbon–chlorine bonds in the CE, CA and CB molecules via mo

... Show More
Publication Date
Sat Jan 01 2022
Journal Name
Desalination And Water Treatment
Optimization and kinetic evaluation of reactive yellow dye degradation by solar photocatalytic process
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An Experimental Research on Design and Development Diversified Controllers for Tri-copter Stability Comparison
...Show More Authors
Abstract<p>The drones have become the focus of researchers’ attention because they enter into many details of life. The Tri-copter was chosen because it combines the advantages of the quadcopter in stability and manoeuvrability quickly. In this paper, the nonlinear Tri-copter model is entirely derived and applied three controllers; Proportional-Integral-Derivative (PID), Fractional Order PID (FOPID), and Nonlinear PID (NLPID). The tuning process for the controllers’ parameters had been tuned by using the Grey Wolf Optimization (GWO) algorithm. Then the results obtained had been compared. Where the improvement rate for the Tri-copter model of the nonlinear controller (NLPID) if compared with </p> ... Show More
View Publication
Crossref (1)
Crossref