Preferred Language
Articles
/
YRjhvZUBVTCNdQwCaH6Z
Study of the Sensitivity of Carbon Quantum Dots for NO2 Gas Sensor and improve it using Graphene
...Show More Authors

Gas sensors are essential for detecting noxious gases that have a detrimental effect on people's health and welfare. Carbon quantum dots (CQDs) are the fundamental component of gas detectors. CQDs and graphene (Gr) were prepared using the electrochemical method. The gas sensitivity of these materials was evaluated at different temperatures (150, 200, 250 °C) to assess their effectiveness. Subsequently, experiments were conducted at different temperatures to ascertain that the combination of CQDs and Gr, with various percentages of Gr and CQDs, exhibited superior gas sensitization properties compared to CQDs alone. This was evaluated based on criteria such as sensitivity, recovery time, and reaction time. Interestingly, the combination was highly responsive. The quantum dots on glass substrates could detect NO2 gas at the abovementioned temperatures. Experimental evidence showed that the gas sensor can only detect graphene at low temperatures.

Crossref
View Publication
Publication Date
Sun Jun 06 2010
Journal Name
Baghdad Science Journal
Stochastic Non-Linear Pseudo-Random Sequence Generator
...Show More Authors

Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence

View Publication Preview PDF
Crossref
Publication Date
Tue Oct 20 2020
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Comparison Among Three Estimation Methods to Estimate Cascade Reliability Model (2+1) Based On Inverted Exponential Distribution
...Show More Authors

      In this paper, we are mainly concerned with estimating cascade reliability model (2+1) based on inverted exponential distribution and comparing among the estimation methods that are used . The maximum likelihood estimator and uniformly minimum variance unbiased estimators are used to get  of the strengths  and the stress ;k=1,2,3 respectively then, by using the unbiased estimators, we propose Preliminary test single stage shrinkage (PTSSS) estimator when a prior knowledge is available for the scale parameter as initial value due past experiences . The Mean Squared Error [MSE] for the proposed estimator is derived to compare among the methods. Numerical results about conduct of the considered

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2013
Journal Name
International Journal Of Computer Applications
Mixed Convection in a Square Cavity Filled with Porous Medium with Heated Bottom Wall
...Show More Authors

Two-dimensional unsteady mixed convection in a porous cavity with heated bottom wall is numerically studied in the present paper. The forced flow conditions are imposed by providing a hydrostatic pressure head at the inlet port that is located at the bottom of one of the vertical side walls and an open vent at the top of the other vertical side wall. The Darcy model is adopted to model the fluid flow in the porous medium and the combination effects of hydrostatic pressure head and the heat flux quantity parameters are carefully investigated. These governing parameters are varied over wide ranges and their effect on the heat transfer characteristics is studied in detail. It is found that the time required to reach a desired temperature at th

... Show More
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Engineering
Mixed Convection in a Square Cavity Filled with Porous Medium with Bottom Wall Periodic Boundary Condition
...Show More Authors

Transient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic pressure head , , , , and ), sinusoidal amplitude range of

... Show More
Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Mixed Convection in a Square Cavity Filled with Porous Medium with Bottom Wall Periodic Boundary Condition
...Show More Authors

Transient mixed convection heat transfer in a confined porous medium heated at periodic sinusoidal heat flux is investigated numerically in the present paper. The Poisson-type pressure equation, resulted from the substituting of the momentum Darcy equation in the continuity equation, was discretized by using finite volume technique. The energy equation was solved by a fully implicit control volume-based finite difference formulation for the diffusion terms with the use of the quadratic upstream interpolation for convective kinetics scheme to discretize the convective terms and the temperature values at the control volume faces. The numerical study covers a range of the hydrostatic  pressure sinusoidal  amplitude  range and

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
SBOA: A Novel Heuristic Optimization Algorithm
...Show More Authors

A new human-based heuristic optimization method, named the Snooker-Based Optimization Algorithm (SBOA), is introduced in this study. The inspiration for this method is drawn from the traits of sales elites—those qualities every salesperson aspires to possess. Typically, salespersons strive to enhance their skills through autonomous learning or by seeking guidance from others. Furthermore, they engage in regular communication with customers to gain approval for their products or services. Building upon this concept, SBOA aims to find the optimal solution within a given search space, traversing all positions to obtain all possible values. To assesses the feasibility and effectiveness of SBOA in comparison to other algorithms, we conducte

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Apr 01 2014
Journal Name
International Journal Of Physics And Research (ijpr)
GAMMA RAY PROPERTIES FROM70As NUCLEUS
...Show More Authors

Multipole mixing ratios for gamma transition populated in from reaction have been studied by least square fitting method also transition strength ] for pure gamma transitions have been calculated taking into account the mean life time for these levels .

Publication Date
Sun Apr 06 2025
Journal Name
Мир русского слова
Лингвоориентированная методика преподавания русского языка как иностранного в арабской аудитории
...Show More Authors

Статья посвящена возможности использования в обучении русскому языку как иностранному лингвоориентированной методики для арабских студентов. Обосновывается термин «лингвоориентированная методика», предложенный В. Н. Вагнер, и на основе положений заявленной методики проводится сопоставление изучаемого (русского) языка с родным (арабским) языком обучающихся.

View Publication Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Baghdad Science Journal
Modified Weighted Pareto Distribution Type I (MWPDTI)
...Show More Authors

In this paper, the Azzallini’s method used to find a weighted distribution derived from the standard Pareto distribution of type I (SPDTI) by inserting the shape parameter (θ) resulting from the above method to cover the period (0, 1] which was neglected by the standard distribution. Thus, the proposed distribution is a modification to the Pareto distribution of the first type, where the probability of the random variable lies within the period  The properties of the modified weighted Pareto distribution of the type I (MWPDTI) as the probability density function ,cumulative distribution function, Reliability function , Moment and  the hazard function are found. The behaviour of probability density function for MWPDTI distrib

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref