Preferred Language
Articles
/
5xaZQ4cBVTCNdQwCoD6K
Remineralization of Dentine Caries Using Moringa Oleifera Based Nano-Silver Fluoride: A Single-Blinded, Randomized, Active-Controlled Clinical Trial
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 30 2009
Journal Name
Iraqi Journal Of Physics
Preparation of Polyvinyl Alcohol/ Tio2 Nano Fiber by Electrospinning
...Show More Authors

In this research we prepared nanofibers by electrospinning from
poly (Vinyl Alcohol) /TiO2. The spectrum of the solution (Emission)
was studied and found to be at 772 nm, several process parameters
were such as concentration of TiO2 , and the effect of distance from
nozzle tip to the grounded collector (gap distance). The result of the
lower concentration of, the smaller the diameter of nanofiber is.
Increasing the gap distance will affect nanofibers diameter

View Publication Preview PDF
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Optimization of nanostructured/nano sized rice husk ash preparation
...Show More Authors

The objective of the study is developing a procedure for production and characterization of rice husk ash (RHA). The effects of rice husk (RH) amount, burning/cooling conditions combined with stirring on producing of RHA with amorphous silica, highest SiO2, lowest loss on ignition (LOI), uniform particle shape distribution and nano structured size have been studied. It is concluded that the best amount is 20 g RH in 125 ml evaporating dish Porcelain with burning for 2 h at temperature 700 °C combined with cooling three times during burning to produce RHA with amorphous silica, SiO2 90.78% and LOI 1.73%. On the other hand, cooling and stirring times affect the variation of nano structured size and particle shape dis

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2009
Journal Name
Iraqi Journal Of Physics
Preparation of Polyvinyl Alcohol/ Tio2 Nano Fiber by Electrospinning
...Show More Authors

ِabstract:In this research we prepared nanofibers by electrospinning from poly (Vinyl Alcohol) /TiO2. The spectrum of the solution (Emission) was studied and found to be at 772 nm, several process parameters were such as concentration of TiO2 , and the effect of distance from nozzle tip to the grounded collector (gap distance). The result of the lower concentration of, the smaller the diameter of nanofiber is. Increasing the gap distance will affect nanofibers diameter.

Preview PDF
Publication Date
Tue Apr 21 2020
Journal Name
University Of Thi-qar Journal Of Science (university Of Thi-qar Journal Of Science (utsci) The 4th Scientific Conference Of Science College/ University Of Thi_qari) The 4th Scientific Conference Of Science College/ University Of Thi_qar
Enhancement of Nano Catalyst for an Alkaline Fuel Cells
...Show More Authors

Preview PDF
Publication Date
Sun May 30 2021
Journal Name
Iraqi Journal Of Science
Preparation of PPy-WO3 Nano-composite for Supercapacitor Applications
...Show More Authors

In this work, polypyrrole (PPy) composites were chemically prepared by a chemical oxidation method. Also, Tungsten Trioxide (WO3) nanoparticles were prepared and added in certain proportions to PPy. The structure properties were studied for the polypyrole and tungesten trioxide separately before mixing them together. The X-ray diffraction (XRD) analysis revealed a hexagonal WO3 and a triclinic PPy. It was observed that the nano-composite prepared by the addition of WOwith 10 and 20% volume ratios to PPy shows a triclinic phase with the presence of hexagons. The molecular structures of PPy, WO3, and PPy–WO3 nano composites were depicted by Fourier-transform infrare

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (17)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Tue Nov 30 2021
Journal Name
Iraqi Journal Of Science
Text-based Steganography using Huffman Compression and AES Encryption Algorithm
...Show More Authors

In every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs  provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sat Nov 28 2020
Journal Name
Iraqi Journal Of Science
Using Affiliation Rules-based Data Mining Technique in Referral System
...Show More Authors

Referral techniques are normally employed in internet business applications. Existing frameworks prescribe things to a particular client according to client inclinations and former high evaluations. Quite a number of methods, such as cooperative filtering and content-based methodologies, dominate the architectural design of referral frameworks. Many referral schemes are domain-specific and cannot be deployed in a general-purpose setting. This study proposes a two-dimensional (User × Item)-space multimode referral scheme, having an enormous client base but few articles on offer. Additionally, the design of the referral scheme is anchored on the  and  articles, as expressed by a particular client, and is a combination of affi

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref