Preferred Language
Articles
/
TReRWJABVTCNdQwC-Yd3
Specific NH<sub>3</sub> Gas Sensor Worked at Room Temperature Based on MWCNTs-OH Network
...Show More Authors

Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) network with thickness 4μm was made by the vacuum filtration from suspension (FFS) method. The morphology, structure and optical properties of the MWCNTs film were characterized by SEM and UV-Vis. spectra techniques. The SEM images reflected highly ordered network in the form of ropes or bundles with close-packing which looks like spaghetti. The absorbance spectrum revealed that the network has a good absorbance in the UV-Vis. region. The gas sensor system was used to test the MWCNT-OH network to detect NH3gas at room temperature. The resistance of the sensor was increased when exposed to the NH3gas. The sensitivities of the network were 1.3% at 14ppm, 3.3% at 27ppm and 6.13% at 68ppm. The sensor is specifically sensitive to NH3gas and does not affect by the amount of ambient air.

Crossref
View Publication
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of 3 - Substituted Coumarin
...Show More Authors

The reaction of(2-oxo-2H-chromen-3-Carbonyl chloride)(k1) with hydrazine in boiling ethanol gives the hydrazide(K2).When compound (k2) reacts with various aromatic aldehydes ,the corres ponding Schiff bases(k3–k4) achieve new series of thiazotidines (k5–k6) and azetidinones (k7–k8) obtained from the reactions of appropriate Schiff bases with mercapto acetic acid and chloro acetyl chloride respectively. All the compounds are characterized by FT-IR,1H-NMR and GC-Ms.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Ceramics International
Influence of DC magnetron sputtering reaction gas on structural and optical characteristics of Ce-oxide thin films
...Show More Authors

The influence of the reaction gas composition during the DC magnetron sputtering process on the structural, chemical and optical properties of Ce-oxide thin films was investigated. X-ray diffraction (XRD) studies confirmed that all thin films exhibited a polycrystalline character with cubic fluorite structure for cerium dioxide. X-ray photoelectron spectroscopy (XPS) analyses revealed that cerium is present in two oxidation states, namely as CeO2 and Ce2O3, at the surface of the films prepared at oxygen/argon flow ratios between 0% and 7%, whereas the films are completely oxidized into CeO2 as the aforementioned ratio increases beyond 14%. Various optical parameters for the thin films (including an optical band gap in the range of 2.25–3.

... Show More
View Publication
Scopus (21)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Tue Nov 08 2022
Journal Name
V. International Scientific Congress Of Pure, Applied And Technological Sciences
The effect of background vacuum pressure on the length of gas discharge plasma by using Aluminum electrodes
...Show More Authors

Length of plasma generated by dc gas discharge under different vacuum pressures was studied experimentally. The cylindrical discharge tube of length 2m was evacuated under vacuum pressure range (0.1-0.5) mbar at constant external working dc voltage 1500V. It was found that the plasma length (L) increased exponentially with increasing of background vacuum air pressure. Empirical equation has been obtained between plasma length and gas pressure by using Logistic model of curve fitting. As vacuum pressure increases the plasma length increases due to collisions, ionizations, and diffusions of electrons and ions.

Publication Date
Fri Sep 23 2022
Journal Name
Specialusis Ugdymas
Text Cryptography based on Arabic Words Characters Number
...Show More Authors

Cryptography is a method used to mask text based on any encryption method, and the authorized user only can decrypt and read this message. An intruder tried to attack in many manners to access the communication channel, like impersonating, non-repudiation, denial of services, modification of data, threatening confidentiality and breaking availability of services. The high electronic communications between people need to ensure that transactions remain confidential. Cryptography methods give the best solution to this problem. This paper proposed a new cryptography method based on Arabic words; this method is done based on two steps. Where the first step is binary encoding generation used t

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Journal Of Physics: Conference Series
Improve topic modeling algorithms based on Twitter hashtags
...Show More Authors
Abstract<p>Today with increase using social media, a lot of researchers have interested in topic extraction from Twitter. Twitter is an unstructured short text and messy that it is critical to find topics from tweets. While topic modeling algorithms such as Latent Semantic Analysis (LSA) and Latent Dirichlet Allocation (LDA) are originally designed to derive topics from large documents such as articles, and books. They are often less efficient when applied to short text content like Twitter. Luckily, Twitter has many features that represent the interaction between users. Tweets have rich user-generated hashtags as keywords. In this paper, we exploit the hashtags feature to improve topics learned</p> ... Show More
View Publication
Scopus (19)
Crossref (17)
Scopus Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Keystroke Dynamics Authentication based on Naïve Bayes Classifier
...Show More Authors

Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. As the dependence upon computers and computer networks grows, the need for user authentication has increased. User’s claimed identity can be verified by one of several methods. One of the most popular of these methods is represented by (something user know), such as password or Personal Identification Number (PIN). Biometrics is the science and technology of authentication by identifying the living individual’s physiological or behavioral attributes. Keystroke authentication is a new behavioral access control system to identify legitimate users via their typing behavior. The objective of this paper is to provide user

... Show More
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Classification of fetal abnormalities based on CTG signal
...Show More Authors

The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Journal Of Engineering
GNSS Baseline Configuration Based on First Order Design
...Show More Authors

The quality of Global Navigation Satellite Systems (GNSS) networks are considerably influenced by the configuration of the observed baselines. Where, this study aims to find an optimal configuration for GNSS baselines in terms of the number and distribution  of baselines to improve the quality criteria of the GNSS networks. First order design problem (FOD) was applied in this research to optimize GNSS network baselines configuration, and based on sequential adjustment method to solve its objective functions.

FOD for optimum precision (FOD-p) was the proposed model which based on the design criteria of A-optimality and E-optimality. These design criteria were selected as objective functions of precision, whic

... Show More
View Publication