Preferred Language
Articles
/
NRbTtIcBVTCNdQwCal1D
Thermochromic and opacity behaviors in vanadium dioxide nanofilms: a theoretical study
Abstract<p>Vanadium dioxide nanofilms are one of the most essential materials in electronic applications like smart windows. Therefore, studying and understanding the optical properties of such films is crucial to modify the parameters that control these properties. To this end, this work focuses on investigating the opacity as a function of the energy directed at the nanofilms with different thicknesses (1–100) nm. Effective mediator theories (EMTs), which are considered as the application of Bruggeman’s formalism and the Looyenga mixing rule, have been used to estimate the dielectric constant of VO<sub>2</sub> nanofilms. The results show different opacity behaviors at different wavelength ranges (ultraviolet, visible, and infrared). The results depict that the highest opacity of the insulating phase is achieved at the ultraviolet region and it reduces for the metal phase. Besides, the results demonstrate that the opacity possesses a redshift during the changes at the three phases. Regarding the infrared region, the lowest opacity value is achieved at the insulator phase and it increases to the highest value at the metal phase. In the visible region, the opacity behavior remains similar in the three phases. It is worth noting that the lowest opacity is found for thinner nanofilm. Since both the refractive index and the extinction index are among the most essential optical constants, hence, both of them were compared with the experiment results, and an excellent agreement is achieved between them.</p>
Crossref
View Publication
Publication Date
Sat Apr 01 2023
Journal Name
Chemical Methodologies
Scopus (7)
Scopus
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of cove

... Show More
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Mon Oct 28 2019
Journal Name
Iraqi Journal Of Science
On a Class of Meromorphic Multiivalent Functiions Convoluted withi Higher Derivatiives of Fractionali Calculus Operator

The main goal of this paper is to study and discuss a new class of meromorphici "functions[ which are multivalent defined by [fractional  calculus operators. Coefficients iestimates , radiisi of satarlikeness , convexityi and closed-to-iconvexity are studied. Also distortion iand closure theorems for the classi" ,  are considered.

Scopus (7)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Mar 30 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Some Variables Affecting the Formulation of Pentoxifylline (PTX) as a Solid Sustained Release Dosage Form

An inert matrix  that is used to control the release of  (PTX) was prepared using Eudragit RL100 and RSPM types as matrix forming agent . The matrices were prepared by either dry granulation(slugging) , or wet granulation method using chloroform as a solvent evaporation vehichle. The cumulative release was adjusted by using polyvinylpyrollidone (PVP) or ethylcellulose (EC) polymers .The results indicated that   both methods of preparation were valid for incorporation PTX as a sustained release granules .Moreover ,the results revealed that best polymer used  was Eudragit RSPM in 3:20 polymer drug ratio .Besides to that ,   the results indicated that the release profiles were affected by  pH- medium&

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Baghdad Science Journal
Common Fixed Point of a Finite-step Iteration Algorithm Under Total Asymptotically Quasi-nonexpansive Maps

      Throughout this paper, a generic iteration algorithm for a finite family of total asymptotically quasi-nonexpansive maps in uniformly convex Banach space is suggested. As well as weak / strong convergence theorems of this algorithm to a common fixed point are established. Finally, illustrative numerical example by using Matlab is presented.

Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
A New Mixed Nonpolynomial Spline Method for the Numerical Solutions of Time Fractional Bioheat Equation

In this paper, a numerical approximation for a time fractional one-dimensional bioheat equation (transfer paradigm) of temperature distribution in tissues is introduced. It deals with the Caputo fractional derivative with order for time fractional derivative and new mixed nonpolynomial spline for second order of space derivative. We also analyzed the convergence and stability by employing Von Neumann method for the present scheme.

Scopus (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Jun 30 2022
Journal Name
Iraqi Journal Of Science
Enhancement Digital Forensic Approach for Inter-Frame Video Forgery Detection Using a Deep Learning Technique

    The digital world has been witnessing a fast progress in technology, which led to an enormous increase in using digital devices, such as cell phones, laptops, and digital cameras. Thus, photographs and videos function as the primary sources of legal proof in courtrooms concerning any incident or crime. It has become important to prove the trustworthiness of digital multimedia. Inter-frame video forgery one of common types of video manipulation performed in temporal domain. It deals with inter-frame video forgery detection that involves frame deletion, insertion, duplication, and shuffling. Deep Learning (DL) techniques have been proven effective in analysis and processing of visual media. Dealing with video data needs to handle th

... Show More
Scopus (8)
Crossref (4)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
ADJUSTING OFF – CENTERING PROCESS FOR A BLOW MOLDED PLASTIC PRODUCT BY USE OF WINQSB SOFTWARE

In most manufacturing processes, and in spite of statistical control, several process capability indices refer to non conformance of the true mean (µc ) from the target mean ( µT ), and the variation is also high. In this paper, data have been analyzed and studied for a blow molded plastic product (Zahi Bottle) (ZB). WinQSB software was used to facilitate the statistical process control, and process capability analysis and some of capability indices. The relationship between different process capability indices and the true mean of the process were represented, and then with the standard deviation (σ ), of achievement of process capability value that can reduce the standard deviation value and improve production out of theoretical con

... Show More
Crossref
View Publication Preview PDF
Publication Date
Tue Oct 13 2020
Journal Name
2020 Ieee International Conference On Mechatronics And Automation (icma)
Scopus (1)
Scopus Crossref
View Publication
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
Scopus (9)
Crossref (5)
Scopus Crossref
View Publication