Preferred Language
Articles
/
SRbkFIcBVTCNdQwChTWj
Highly-Pure Nanostructured Metal Oxide Multilayer Structure Prepared by DC Reactive Magnetron Sputtering Technique
...Show More Authors

In this work, metal oxides nanostructures, mainly, copper oxide (CuO), nickel oxide (NiO), titanium dioxide (TiO2), and multilayer structure were synthesized by dc reactive magnetron sputtering technique. The structural purity and nanoparticle size of the prepared nanostructures were determined. The individual metal oxide samples (CuO, NiO and TiO2) showed high structural purity and minimum particle sizes of 34, 44, 61 nm, respectively. As well, the multilayer structure showed high structural purity as no elements or compounds other than the three oxides were founds in the final sample while the minimum particle size was 18 nm. This reduction in nanoparticle size can be considered as an advantage for the dc reactive magnetron sputtering technique when metal oxide multilayer structures are prepared.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Delignification of Date Palm Fronds using Modified Organosolv Technique
...Show More Authors

Abstract

  In this study, modified organic solvent (organosolv) method was applied to remove high lignin content in the date palm fronds (type Al-Zahdi) which was taken from the Iraqi gardens. In modified organosolv, lignocellulosic material is fractionated into its constituents (lignin, cellulose and hemicellulose). In this process, solvent (organic)-water is brought into contact with the lignocellulosic biomass at high temperature, using stainless steel reactor (digester). Therefor; most of hemicellulose will remove from the biomass, while the solid residue (mainly cellulose) can be used in various industrial fields. Three variables were studied in this process: temperature, ratio of ethano

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Nov 24 2023
Journal Name
Iraqi Journal Of Science
Adaptive Medical Image Watermarking Technique based on Wavelet Transform
...Show More Authors

In this paper, an adaptive medical image watermarking technique is proposed based on wavelet transform and properties of human visual system in order to maintain the authentication of medical images. Watermark embedding process is carried out by transforming the medical image into wavelet domain and then adaptive thresholding is computed to determine the suitable locations to hide the watermark in the image coefficients. The watermark data is embedded in the coefficients that are less sensitive into the human visual system in order to achieve the fidelity of medical image. Experimental results show that the degradation by embedding the watermark is too small to be visualized. Also, the proposed adaptive watermarking technique can preserv

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Urology Annals
Modified snodgrass hypospadias repair using the lembert suturing technique
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Oct 01 2016
Journal Name
International Journal Of Pure And Apllied Mathematics
A SEMI ANALYTICAL ITERATIVE TECHNIQUE FOR SOLVING DUFFING EQUATIONS
...Show More Authors

View Publication
Crossref (11)
Crossref
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Anovel Immunological Technique for Identification of Human Seminal Fluid
...Show More Authors

An immunological technique was investigated for the detection of human semen in forensic analysis.This technique included a preparation of anti-human seminal plasma antibodies, by immunizing rabbits with treated human semen. The human semen was treated with an acid to prevent cross reactivity with other human body fluids. The antibody produced was tested against different animal,s seminal fluid samples (dog, goat ,sheep, cow) and human body fluids( saliva, blood , vaginal fluid, ear wax and human semen). It was found that using this developed technique was only selectively responsed with human semen . The prepered kit was evaluated and tested in Forensic laboratory- Ministry of Health. Finally, results were obtained in a c

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 02 2024
Journal Name
Advances In Systems Science And Applications
A New Face Swap Detection Technique for Digital Images
...Show More Authors

View Publication
Scopus
Publication Date
Thu Sep 15 2022
Journal Name
Romanian Neurosurgery
Coil migration during pressure-cooker technique for cerebral AVM
...Show More Authors

Introduction: In recent decades, the endovascular treatment of cerebral arteriovenous malformations (AVMs) has advanced. However, it still carries risks of unanticipated complications. Coil migration is a reported complication of aneurysmal coiling procedures. Herein, we report a case of early intraprocedural coil migration during pressure cooker technique embolization of right thalamic AVM, discussing the management and potential explanations. The literature showed no report of coil migration after the pressure cooker technique in the form of coil-augmented Onyx injection technique (CAIT). Case description: An otherwise healthy 26-year-old female suddenly developed a severe headache with no loss of consciousness. Computed tomograp

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Robust Password Encryption Technique with an Extra Security Layer
...Show More Authors

        People are comfortable with e-banking services, but they are exposed to a great deal of danger these days due to fraudulent acts such as password hacking and personal information theft. Everything individuals do online relies heavily on passwords. Using a password protects one's identity online, in forums, and through email. Online transactions are vulnerable to identity theft if they do not have a secure password. Internet users with critical statements are vulnerable to various assaults, including the theft and exploitation of user IDs and passwords. This paper introduces novel password encryption by fingerprint and a random number to make each password unique and robust against attacks, with a magnificent time elapsed o

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Jul 01 2017
Journal Name
Journal Of King Saud University - Science
A semi-analytical iterative technique for solving chemistry problems
...Show More Authors

View Publication
Crossref (17)
Crossref
Publication Date
Sun Apr 28 2024
Journal Name
Journal Of Advances In Information Technology
Enhancement of Recommendation Engine Technique for Bug System Fixes
...Show More Authors

This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially th

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref