Preferred Language
Articles
/
KhgTdJQBVTCNdQwCwRi9
Characterization of Prepared Polyaniline Nanofibers Based on a Hydrothermal Variation of Aniline Concentration
...Show More Authors

Polyaniline nanofibers (PAni-NFs) have been synthesized under various concentrations (0.12, 0.16, and 0.2 g/l) of aniline and different times (2h and 3 h) by hydrothermal method at 90°C. Was conducted with the use of X-ray diffraction (XRD), Fourier Transform Infrared spectra (FTIR), Ultraviolet-Visible (UV-VIS) absorption spectra, Thermogravimetric Analysis (TGA), and Field Emission-Scanning Electron Microscopy (FE-SEM). The X-ray diffraction patterns revealed the amorphous nature of all the produced samples. FE-SEM demonstrated that Polyaniline has a nanofiber-like structure. The observed typical peaks of PAni were (1580, 1300-1240, and 821 cm-1 ), analyzed by the chemical bonding of the formed PAni through FTIR spectroscopy. Also, tests indicated the promotion of the thermal stability of polyaniline nano-composite at temperatures above 600°C. Still, the PAni-0.12 g/l sample was better than the other samples, and the optical parameters manifested a decrease in the band gap (Eg) bandgap. The observed TGA test findings also promoted Polyaniline's thermal stability at temperatures reaching 600°C.

Crossref
View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (7)
Scopus Crossref
Publication Date
Sun Sep 01 2013
Journal Name
International Journal Of Computer Applications
Concise Architecture of a Remote Network based Controller
...Show More Authors

The development of microcontroller is used in monitoring and data acquisition recently. This development has born various architectures for spreading and interfacing the microcontroller in network environment. Some of existing architecture suffers from redundant in resources, extra processing, high cost and delay in response. This paper presents flexible concise architecture for building distributed microcontroller networked system. The system consists of only one server, works through the internet, and a set of microcontrollers distributed in different sites. Each microcontroller is connected through the Ethernet to the internet. In this system the client requesting data from certain side is accomplished through just one server that is in

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Iraqi Journal Of Physics
Structural Properties of Prepared PANI/TiO2 Nanocomposite by Chemical Polymerization
...Show More Authors

A progression of Polyaniline (PANI) and Titanium dioxide (TiO2) nanoparticles (NPs) were prepared by an in-situ polymerization strategy within the sight of TiO2 NPs. The subsequent nanocomposites were analyzed using Fourier-transform infrared spectra (FTIR), X-ray diffraction (XRD), Scanning Electron Microscopy (SEM), and Energy Dispersive X-Ray Analysis (EDX) taken for the prepared samples. PANI/TiO2 nanocomposites were prepared by various compound materials (with H2SO4 0.3 M and without it, to compare the outcome of it) by the compound oxidation technique using ammonium persulfate (APS) as oxidant within the sight of ultrafine grade powder of TiO2 cooled in an ice bath.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Oct 16 2013
Journal Name
International Journal Of Pharmacy And Pharmaceutical Sciences
Effects of mucoadhesive polymers combination on the properties of lisinpril buccal tablets prepared by wet granulation method
...Show More Authors

Scopus (4)
Scopus
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
Effect of Diffusion Temperature on the some Electrical Properties of CdS:In Thin Films Prepared by Vacuum Evaporation
...Show More Authors

CdS films were prepared by thermal evaporation technique at thickness 1 µm on glass substrates and these films were doped with indium (3%) by thermal diffusion method. The electrical properties of these have been investigated in the range of diffusion temperature (473-623 K)> Activation energy is increased with diffusion temperature unless at 623 K activation energy had been decreased. Hall effect results have shown that all the films n-type except at 573 and 623 K and with increase diffusion temperature both of concentration and mobility carriers were increased.

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
The Effect of Thickness on Some Optical Properties of Sb2S3 Thin Films Prepared by Chemical Bath Deposition
...Show More Authors

Sb2S3 thin films have been prepared by chemical bath deposition on a glas sub Absorbance and transmittance spectra were recorded in the wavelength range (30-900) nm. The effects of thickness on absorption coefficient, reflectance, refractive index, extinction coefficient, real and imaginary parts of dielectric constant were estimated. It was found that the reflectivity, absorption coefficient , extinction coefficient, real part of dielectric constant and refractive index, all these parameters decrease as the thickness increased, while the imaginary part of the dielectric constant increase as the thickness incre

... Show More
View Publication Preview PDF
Crossref (5)
Crossref