Preferred Language
Articles
/
WBfjKJEBVTCNdQwCYZPC
Computational modeling study on the physical properties of Pd doped BaTiO3 perovskite

This contribution investigates structural, electronic, and optical properties of cubic barium titanate (BaTiO3) perovskites using first-principles calculations of density functional theory (DFT). Generalized gradient approximations (GGA) alongside with PW91 functional have been implemented for the exchange–correlation potential. The obtained results display that BaTiO3 exhibits a band gap of 3.21 eV which agrees well with the previously experimental and theoretical literature. Interestingly, our results explore that when replacing Pd atom with Ba and Ti atoms at 0.125 content a clear decrease in the electronic band gap of 1.052 and 1.090 eV located within the visible range of electromagnetic wavelengths (EMW). Optical parameters such as absorption, reflectivity, the real and imaginary components of the dielectric function, Loss function, reflective index, extinction coefficient were calculated. Thus, the current findings reveal that Pd–BaTiO3 is a promising composition to be synthesised experimentally for various optoelectronic applications. The predicted negative formation energies values of the inspected structures are indicating to exothermic formation process of such materials and more interestingly indicating also to the stability and possibility of synthesizing such materials experimentally.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2009
Journal Name
Baghdad Science Journal
On Monotonically T2-spaces and Monotonicallynormal spaces

In this paper we show that if ? Xi is monotonically T2-space then each Xi is monotonically T2-space, too. Moreover, we show that if ? Xi is monotonically normal space then each Xi is monotonically normal space, too. Among these results we give a new proof to show that the monotonically T2-space property and monotonically normal space property are hereditary property and topologically property and give an example of T2-space but not monotonically T2-space.

Crossref
View Publication Preview PDF
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
Scopus (8)
Crossref (12)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Feb 27 2021
Journal Name
Iraqi Journal Of Science
Some Results on mX-N-connected Space

In this essay, we utilize m - space to specify mX-N-connected, mX-N-hyper connected and mX-N-locally connected spaces and some functions by exploiting the intelligible mX-N-open set. Some instances and outcomes have been granted to boost our tasks.

Scopus Crossref
View Publication Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Generalized Higher Derivations on ΓM-Modules

The concepts of generalized higher derivations, Jordan generalized higher derivations, and Jordan generalized triple higher derivations on Γ-ring M into ΓM-modules X are presented. We prove that every Jordan generalized higher derivation of Γ-ring M into 2-torsion free ΓM-module X, such that aαbβc=aβbαc, for all a, b, c M and α,βΓ, is Jordan generalized triple higher derivation of M into X.

Scopus (4)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
(,)- Strongly Derivations Pairs on Rings

        Let R be an associative ring. In this paper we present the definition of (s,t)- Strongly derivation pair and Jordan (s,t)- strongly derivation pair on a ring R, and study the relation between them. Also, we study prime rings, semiprime rings, and rings that have commutator left nonzero divisior with (s,t)- strongly derivation pair, to obtain a (s,t)- derivation. Where s,t: R®R are two mappings of R.

View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Network Traffic Prediction Based on Boosting Learning

Classification of network traffic is an important topic for network management, traffic routing, safe traffic discrimination, and better service delivery. Traffic examination is the entire process of examining traffic data, from intercepting traffic data to discovering patterns, relationships, misconfigurations, and anomalies in a network. Between them, traffic classification is a sub-domain of this field, the purpose of which is to classify network traffic into predefined classes such as usual or abnormal traffic and application type. Most Internet applications encrypt data during traffic, and classifying encrypted data during traffic is not possible with traditional methods. Statistical and intelligence methods can find and model traff

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Sep 10 2013
Journal Name
Nature Communications
Carbon nanotubes on a spider silk scaffold

Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.

Scopus (131)
Crossref (132)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Sat Jan 30 2021
Journal Name
Iraqi Journal Of Science
Image Compression Based on Arithmetic Coding Algorithm

The past years have seen a rapid development in the area of image compression techniques, mainly due to the need of fast and efficient techniques for storage and transmission of data among individuals. Compression is the process of representing the data in a compact form rather than in its original or incompact form. In this paper, integer implementation of Arithmetic Coding (AC) and Discreet Cosine Transform (DCT) were applied to colored images. The DCT was applied using the YCbCr color model. The transformed image was then quantized with the standard quantization tables for luminance and chrominance. The quantized coefficients were scanned by zigzag scan and the output was encoded using AC. The results showed a decent compression ratio

... Show More
Scopus (9)
Crossref (5)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication