Preferred Language
Articles
/
UReVWJABVTCNdQwCCocP
A Specific NH<sub>3</sub> Gas Sensor of a Thick MWCNTs-OH Network for Detection at Room Temperature
...Show More Authors

NH3 gas sensor was fabricated based on deposited of Functionalized Multi-Walled Carbon Nanotubes (MWCNTs-OH) suspension on filter paper substrates using suspension filtration method. The structural, morphological and optical properties of the MWCNTs film were characterized by XRD, AFM and FTIR techniques. XRD measurement confirmed that the structure of MWCNTs is not affected by the preparation method. The AFM images reflected highly ordered network in the form of a mat. The functional groups and types of bonding have appeared in the FTIR spectra. The fingerprint (C-C stretch) of MWCNTs appears in 1365 cm-1, and the backbone of CNTs observed at 1645 cm-1. A homemade sensing device was used to evaluate the fabrication network toward NH3 gas at ppm levels as well as the response to sensitivity by changing the concentration. MWCNTs-OH network of 8mm thickness showed an increase in resistance upon exposure to the NH3 gas. The sensor exhibits a good sensitivity for low concentration of NH3 gas at room temperature. The sensitivities of the network were 2.5% at 14ppm, 5.3% at 27ppm and 17.6% at 68ppm. Further investigations showed that the network was specific sensitive to NH3 gas in the environment and not affected by the amount of ambient air.

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Mar 15 2019
Journal Name
Journal Of The College Of Education For Women
Eyes Drugs and Treatment at Ibn al –Haytham: A Historical Study
...Show More Authors

            Ibn al-Haytham is the pioneer of optics, which is a science that had described optics circumstances. Optics or landscape science as it was known by the Arab and Muslim scientists at the time when  is a science known as the conditions of sighters in their quantity and quality as the proximity and distance from the beholder , the different forms , conditions and what mediate between the beholder and the microscopes , to explain useful knowledge of what obscures the sight of the conditions of sighters and is used to measure the space Distant criminality and  mirrors.

Ibn al-Haitham wrote his famous book The Book of Mirrors and studied mistakes adopted the m

... Show More
View Publication Preview PDF
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (3)
Scopus
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Biochemical Cellular Archive
detection of anti-helicobacter pylori cag a antibody in sera of patients with eye diseases
...Show More Authors

The study conducted to investigate the association between Helicobacter pylori infection and eye diseases (Glaucoma, Cataract, CSR and Uveitis). One hundred and four patients with multiple eye disorders (10-80) years were observed from 10/9/2020 to 18/11/2020 and compared to thirty-one healthy people (19 female and 12 male). Each participant was tested for H. pylori CagAAbs and TNF-α using an enzyme-linked immunosorbent assay (ELISA). The results have shown that there was a non-significant difference (p≥0.05) in the concentration of CagAantibodies in sera of patients with eye diseases except in the case of CSR (central serous chorioretinopathy), which was a significant difference (P≤0.05) compared to the control group. Also, the result

... Show More
Publication Date
Fri Jan 01 2021
Journal Name
Review Of International Geographical Education
Evaluating the performance of project management using network diagrams methods: A case study in the Ramadi Municipality
...Show More Authors

This study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the applica

... Show More
Scopus (1)
Scopus
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Clinical And Experimental Dentistry
Bond strength of a new Kevlar fiber-reinforced composite post with semi-interpenetrating polymer network (IPN) matrix
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Nov 01 2017
Journal Name
Nano Hybrids And Composites
Photodetection of Near and Middle IR Lasers by f-MWCNTs/Polythiophen Nanocomposite Detector
...Show More Authors

The combination of carbon nanotubes (CNT) and conducting polymers offers an attractive route for the production of novel compounds that can be used in a variety of applications such as sensors, actuators, and molecular scale electronic devices. In this work, functionalized multiwall carbon nanotubes (f-MWCNTs) were added in different load ratios (3 wt%, 5 wt% and 10 wt%) to thiophen (PTh) polymer to procedure PTh/CNTs nanocomposite and deposited on porous silicon substrate by electropolarization. Photoconductive detectors were fabricated using PTh/f-MWCNTs matrix to work in the near region and middle IR regions. These detectors were illuminated by semiconductor laser diode wavelength of 808(nm) and Nd-YAG laser of wavelength 1064 (n

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Desalination And Water Treatment
Stabilization of phenol trapped by agricultural waste: a study of the influence of ambient temperature on the adsorbed phenol
...Show More Authors

Stabilization of phenol trapped by agricultural waste: a study of the influence of ambient temperature on the adsorbed phenol

Crossref (22)
Clarivate Crossref
Publication Date
Wed Jan 30 2013
Journal Name
Al-kindy College Medical Journal
Paraphilia in Iraq, a general sketch A study in the sex clinic, at Al-Rashad teaching mental hospital
...Show More Authors

Background; paraphilias were studied in the sex
clinic, at Al-Rashad teaching mental hospital, in the
years 2009-2010, a subject never touched before in the
field of psychiatry in Iraq.
Aims of the study :
1-to identify the prevalence of types and number of
paraphilias in those patients.
2-to study the relationship of paraphilias with
sociodemographic factors of the patients.
Patients and methods; using the diagnostic criteria of
DSM IV TR, 52 patients from the outpatient sex clinic
at Al-Rashad mental hospital, collected and studied (41
males and 11 females).
Results; the ratio of men to women was 3.7 : 1, the
majority of our sample was in the age range of 21-30
years (36.35%), with a limited

... Show More
View Publication Preview PDF