Preferred Language
Articles
/
DRa-CYoBVTCNdQwCyZCA
Highly Sensitive Fiber Brag Grating Based Gas Sensor Integrating Polyaniline Nanofiber for Remote Monitoring
...Show More Authors

Crossref
View Publication
Publication Date
Mon Jul 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Assessment of Two Extraction Methods LLE and QUEChERS to Determine Pesticides Residues in Vegetables by Gas Chromatography
...Show More Authors
Abstract<p>The extraction of pesticides is a critical and urgent issue in the preparation for and determination of pesticide residues. The lack of a quick, easy, and successful extraction process is the most critical and challenging problem, even if diagnostic tools have improved and pesticide residues have been better understood. This study contrasted the QuEChERS method, which uses gas chromatography with a flame ionization detector, with the LLE method, which uses liquid-liquid extraction, in order to extract pyridaben from cucumbers and spiromesifen from tomatoes. The GC-FID device was employed to ascertain the spiromesifen LOD and LOQ, which were 0.002 μg mL<sup>-1</sup> and 0.00</p> ... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Ceramics International
Influence of DC magnetron sputtering reaction gas on structural and optical characteristics of Ce-oxide thin films
...Show More Authors

The influence of the reaction gas composition during the DC magnetron sputtering process on the structural, chemical and optical properties of Ce-oxide thin films was investigated. X-ray diffraction (XRD) studies confirmed that all thin films exhibited a polycrystalline character with cubic fluorite structure for cerium dioxide. X-ray photoelectron spectroscopy (XPS) analyses revealed that cerium is present in two oxidation states, namely as CeO2 and Ce2O3, at the surface of the films prepared at oxygen/argon flow ratios between 0% and 7%, whereas the films are completely oxidized into CeO2 as the aforementioned ratio increases beyond 14%. Various optical parameters for the thin films (including an optical band gap in the range of 2.25–3.

... Show More
View Publication
Scopus (23)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Tue Mar 01 2016
Journal Name
International Journal Of Computer Science And Mobile Computing
Content-Based Cartoon Image Retrieval
...Show More Authors

Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Windows-Based Special Applications Router
...Show More Authors

The design and implementation of an active router architecture that enables flexible network programmability based on so-called "user components" will be presents. This active router is designed to provide maximum flexibility for the development of future network functionality and services. The designed router concentrated mainly on the use of Windows Operating System, enhancing the Active Network Encapsulating Protocol (ANEP). Enhancing ANEP gains a service composition scheme which enables flexible programmability through integration of user components into the router's data path. Also an extended program that creates and then injects data packets into the network stack of the testing machine will be proposed, we will call this program

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Hybrid CNN-based Recommendation System
...Show More Authors

Recommendation systems are now being used to address the problem of excess information in several sectors such as entertainment, social networking, and e-commerce. Although conventional methods to recommendation systems have achieved significant success in providing item suggestions, they still face many challenges, including the cold start problem and data sparsity. Numerous recommendation models have been created in order to address these difficulties. Nevertheless, including user or item-specific information has the potential to enhance the performance of recommendations. The ConvFM model is a novel convolutional neural network architecture that combines the capabilities of deep learning for feature extraction with the effectiveness o

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Thu Oct 03 2024
Journal Name
Phi Delta Kappan
Literacy-based instruction in STEM
...Show More Authors

Socio-scientific issues provide a great platform to both engage students in scientific topics and assess their understanding of scientific concepts. Nancy R. Singer, Amy Lannin, Maha Kareem, William Romine, and Katie Kline report on the STEM Literacy Project, a three-year National Science Foundation grant that aimed to improve STEM teachers’ knowledge and integration of literacy in their classrooms. They describe teachers’ professional learning, scenario-based assessments and other strategies they incorporated in their STEM classrooms, and how writing enables students to understand real-world issues.

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
The of Effect Instructional Design based on Kagan Structure In Generating Information Skills for First Intermediate Student’s In Mathematics
...Show More Authors

 

The aim of the research is to identify the effect of instructional design according to Kagan structure among the first intermediate school student’s, and how skills could help in generating information in mathematics. In accordance with the research objectives, the researcher has followed the experimental research method by adopting an experimental design with two equivalent groups of post-test to measure skills in generating information. Accordingly, the researcher raised two main null hypotheses: there were no statistically significant differences at the level of significance (0.05) between the average scores of the experimental group who studied the material according to Kagan structure and th

... Show More
View Publication Preview PDF
Publication Date
Fri Nov 01 2013
Journal Name
Radioelectronics And Communications Systems
Erratum to: “BER Performance Enhancement for Secure Wireless Communication Systems Based on DCSK-MIMO Techniques under Rayleigh Fading Channel”
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide low bit error rates (BER) along with information security. The aim of such activity is to steal or distort the information being conveyed. Optical Wireless Systems (basically Free Space Optic Systems, FSO) are no exception to this trend. Thus, there is an urgent necessity to design techniques that can secure privileged information against unauthorized eavesdroppers while simultaneously protecting information against channel-induced perturbations and errors. Conventional cryptographic techniques are not designed

... Show More
View Publication
Scopus Crossref