Preferred Language
Articles
/
-ReQkpIBVTCNdQwCabdT
A facile method of deriving solar selective nickel-cobalt oxide thin films via spraying process
...Show More Authors
Abstract<p>The present study focuses on synthesizing solar selective absorber thin films, combining nanostructured, binary transition metal spinel features and a composite oxide of Co and Ni. Single-layered designs of crystalline spinel-type oxides using a facile, easy and relatively cost-effective wet chemical spray pyrolysis method were prepared with a crystalline structure of M<sub>x</sub>Co<sub>3−x</sub>O<sub>4</sub>. The role of the annealing temperature on the solar selective performance of nickel-cobalt oxide thin films (∼725 ± 20 nm thick) was investigated. XRD analysis confirmed the formation of high crystalline quality thin films with a crystallite size in the range of 27–52 nm. The highest solar absorptance (∼85.2%) and the lowest thermal emittance (∼4.45%) along with the highest values of both hardness and the Young’s modulus (19.1 GPa and 104 GPa, respectively) were obtained for the film annealed at 600 °C. In addition, the synthesized nickel-cobalt oxide thin films show band gap energies in the range of 1.15–1.38 eV and excellent thermal stability at higher temperatures, which makes them interesting candidates for solar absorbing applications.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Africa Health Research Organization
The anti- Leishmaniasis activity of green synthesis silver oxide nanoparticles
...Show More Authors

View Publication
Scopus (14)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Effect of Silver Oxide Film Thickness on Some Optical Parameter
...Show More Authors

Films of silver oxide of different thickness have been prepared by the chemical spray paralysis. Transmission and absorption spectra have recorded in order to study the effect of increasing thickness on some optical parameter such as reflectance, refractive index , and dielectric constant in its two parts . This study reveals that all these paramters affect by increasing the thickness .

View Publication Preview PDF
Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
The effect of using Nano iron oxide in radiological shielding
...Show More Authors
Abstract<p>In this study, some attenuation parameters of gamma shields were studied. This shields consisting of composite materials of Unsaturated polyester as a base material and Nano iron oxide (Fe<sub>2</sub>O<sub>3</sub>) and, micro iron (Fe) as reinforcement materials at different percentages (1, 3,5,7and 9)wt%, and with different thickness (1, 1.5, 2, 2.5, 3, 3.5and 4) cm. The results showed that the use of nanoparticles is better than the microparticales in the field of radiation shielding. It has been shown that the values of attenuation parameters of gamma it bitter in the case of nanoparticles than case of the use of micro material.</p>
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Production of Zinc oxide for medical application from Zinc scraps
...Show More Authors

In this work ,medical zinc oxide was produced from zinc scraps instead of traditional method which used for medical applications such as skin diseases, Iraq is importing around 50 ton/year for samarra plant the producted powder has apartical size less than 5 micron and the purity was more than 99.98%,also apilot plant of yield capacitiy 15 kg/8hours wsa designed and manufactured .

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A New Feature-Based Method for Similarity Measurement under the Linux Operating System
...Show More Authors

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref