Preferred Language
Articles
/
TRfMFZIBVTCNdQwCjZ7y
Electromagnetic Scattering Properties and Characterisation of Sintered SiC Composite–Based Microwave Spectrum
...Show More Authors

واحدة من أكثر مواد السيراميك الهيكلية الواعدة هي كربيد السيليكون(SiC) ، حيث له خصائص حرارية وكهروميكانيكية ممتازة. هذه الخصائص مفيدة ل CMC لتعزيز أداء المركب خاصة عند إضافات النانو المتكاملة. في هذا البحث, تم تصنيع مركب SiC من SiC بثلاثة تركيزات مع  ZnO و Si. تم اختبار الخواص المغناطيسية لجميع المخاليط باستخدام مراقبة العينة الاهتزازية (VSM). تم تلبيد العينات الخضراء في فرن التلبيد عند 1600 درجة مئوية في بيئة النيتروجين. تم اختبار جميع المركبات التي تم الحصول عليها وتوصيفها باستخدام تقنيات و توصيفات مختلفة مثل حيود الأشعة السينية، ومورفولوجيا السطح تمت باستخدام FESEM، ومحلل الشبكة لاختبار الخصائص العازلة للعينات. بناء على بيئة التلبيد، تم اكتشاف نيتريد السيليكون في المركب بسبب عملية النتردة على طول المركب. من ناحية أخرى، تم حساب الخصائص المغناطيسية والامتصاصية لجميع مركبات SiC. تعتبر الخصائص العازلة عالية حيث يميل المركب إلى أن يكون عاكسا في نطاق التردد المنخفض و نافذ كلما زاد التردد على طول نطاق التردد.

Scopus Crossref
View Publication
Publication Date
Wed Oct 01 2025
Journal Name
Journal Of Economics And Administrative Sciences
A Modified Fama-MacBeth Model based on the Single-Index Model
...Show More Authors

The aim of this essay is to use a single-index model in developing and adjusting Fama-MacBeth.  Penalized smoothing spline regression technique (SIMPLS) foresaw this adjustment.  Two generalized cross-validation techniques, Generalized Cross Validation Grid (GGCV) and Generalized Cross Validation Fast (FGCV), anticipated the regular value of smoothing covered under this technique. Due to the two-steps nature of the Fama-MacBeth model, this estimation generated four estimates: SIMPLS(FGCV) - SIMPLS(FGCV), SIMPLS(FGCV) - SIM PLS(GGCV), SIMPLS(GGCV) - SIMPLS(FGCV), SIM PLS(GGCV) - SIM PLS(GGCV). Three-factor Fama-French model—market risk premium, size factor, value factor, and their implication for excess stock returns and portfolio return

... Show More
View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
2016 Al-sadeq International Conference On Multidisciplinary In It And Communication Science And Applications (aic-mitcsa)
Landsat-8 (OLI) classification method based on tasseled cap transformation features
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 01 2012
Journal Name
International Journal Of Reasoning-based Intelligent Systems
SLMS: a smart library management system based on an RFID technology
...Show More Authors

View Publication
Scopus (21)
Crossref (12)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Priority Based Transmission Rate Control with Neural Network Controller in WMSNs
...Show More Authors

Wireless Multimedia Sensor Networks (WMSNs) are networks of wirelessly interconnected sensor nodes equipped with multimedia devices, such as cameras and microphones. Thus a WMSN will have the capability to transmit multimedia data, such as video and audio streams, still images, and scalar data from the environment. Most applications of WMSNs require the delivery of multimedia information with a certain level of Quality of Service (QoS). This is a challenging task because multimedia applications typically produce huge volumes of data requiring high transmission rates and extensive processing; the high data transmission rate of WMSNs usually leads to congestion, which in turn reduces the Quality of Service (QoS) of multimedia appli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Engineering
Enhanced Chain-Cluster Based Mixed Routing Algorithm for Wireless Sensor Networks
...Show More Authors

Energy efficiency is a significant aspect in designing robust routing protocols for wireless sensor networks (WSNs). A reliable routing protocol has to be energy efficient and adaptive to the network size. To achieve high energy conservation and data aggregation, there are two major techniques, clusters and chains. In clustering technique, sensor networks are often divided into non-overlapping subsets called clusters. In chain technique, sensor nodes will be connected with the closest two neighbors, starting with the farthest node from the base station till the closest node to the base station. Each technique has its own advantages and disadvantages which motivate some researchers to come up with a hybrid routing algorit

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
Chemical sensor based on a solid-core photonic crystal fiber interferometer
...Show More Authors

Photonic crystal fiber interferometers are used in many sensing applications. In this work, an in-reflection photonic crystal fiber (PCF) based on Mach-Zehnder (micro-holes collapsing) (MZ) interferometer, which exhibits high sensitivity to different volatile organic compounds (VOCs), without the needing of any permeable material. The interferometer is robust, compact, and consists of a stub photonic crystal fiber of large-mode area, photonic crystal fiber spliced to standard single mode fiber (SMF) (corning-28), this splicing occurs with optimized splice loss 0.19 dB In the splice regions the voids of the holey fiber are completely collapsed, which allows the excitation and recombination of core and cladding modes. The device reflection

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
PROTOTYPING TO DESIGN AN ANAGLYPH 3D IMAGE BASED ON WATERFALL MODEL
...Show More Authors

In this paper, a discussion of the principles of stereoscopy is presented, and the phases
of 3D image production of which is based on the Waterfall model. Also, the results are based
on one of the 3D technology which is Anaglyph and it's known to be of two colors (red and
cyan).
A 3D anaglyph image and visualization technologies will appear as a threedimensional
by using a classes (red/cyan) as considered part of other technologies used and
implemented for production of 3D videos (movies). And by using model to produce a
software to process anaglyph video, comes very important; for that, our proposed work is
implemented an anaglyph in Waterfall model to produced a 3D image which extracted from a
video.

View Publication Preview PDF
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Bionics-Based Approach for Object Tracking to Implement in Robot Applications
...Show More Authors

In this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based

... Show More
View Publication Preview PDF