Preferred Language
Articles
/
bsj-2906
Comparison of Mercury Intrusion and Nitrogen Adsorption Measurements for the Characterization of Certain Natural Raw Materials Deposits
...Show More Authors

The porosity of materials is important in many applications, products and processes, such as electrochemical devices (electrodes, separator, active components in batteries), porous thin film, ceramics, soils, construction materials, ..etc. This can be characterized in many different methods, and the most important methods for industrial purposes are the N2 gas adsorption and mercury porosimetry. In the present paper, both of these techniques have been used to characterize some of Iraqi natural raw materials deposits. These are Glass Sand, Standard Sand, Flint Clay and Bentonite. Data from both analyses on the different types of natural raw materials deposits are critically examined and discussed. The results of specific surface areas showed considerable difference between the two sets of data on the same material. This indicates that the material have an external surface which can not be measure by mercury porosimeter. Also pore size distribution data obtained from N2 adsorption measurements shows a wide range of the smallest pore size. This result suggests that materials have micropores using IUPAC definitions of pore size.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (4)
Scopus
Publication Date
Tue Aug 15 2023
Journal Name
Bionatura
Gene expression of a nitrogen tolerance gene ZmNR1 under the influence of different levels of nitrogen in maize
...Show More Authors

A field experiment was carried out in the College of Agricultural Engineering Sciences - University of Baghdad, during the fall season of 2021 to find out which cultivated cultivars of maize are efficient under nitrogen fertilization. The experiment was applied according to an RCBD (split-plot design with three replications). The cultivars of the experiment (Baghdad, 5018, Sarah) supply three levels of nitrogen fertilizer, which are N1 (100 kg.N/ha), N2 (200 kg.N/ha) and N3 (300 kg.N/ha). The statistical analysis results showed the superiority of the Sarah genotype, which gave the highest value of SOD and CAT enzymes, reaching 11.59 units mg-1 and 10.76 units mg-1 . Protein sequentially, while cultivar5018 outperformed as it gave th

... Show More
View Publication
Scopus (14)
Crossref (9)
Scopus Crossref
Publication Date
Tue May 30 2017
Journal Name
Environmental Earth Sciences
Purification of aqueous solutions from Pb(II) by natural bentonite: an empirical study on chemical adsorption
...Show More Authors

View Publication
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Tue May 30 2017
Journal Name
Environmental Earth Sciences
Purification of aqueous solutions from Pb(II) by natural bentonite: an empirical study on chemical adsorption
...Show More Authors

View Publication
Scopus (15)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Tue Nov 01 2011
Journal Name
Iraqi Journal Of Applied Physics
Calculation of the Buildup Factors for Ceramic Materials
...Show More Authors

Preview PDF
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Performance Analysis of different Machine Learning Models for Intrusion Detection Systems
...Show More Authors

In recent years, the world witnessed a rapid growth in attacks on the internet which resulted in deficiencies in networks performances. The growth was in both quantity and versatility of the attacks. To cope with this, new detection techniques are required especially the ones that use Artificial Intelligence techniques such as machine learning based intrusion detection and prevention systems. Many machine learning models are used to deal with intrusion detection and each has its own pros and cons and this is where this paper falls in, performance analysis of different Machine Learning Models for Intrusion Detection Systems based on supervised machine learning algorithms. Using Python Scikit-Learn library KNN, Support Ve

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Thu May 31 2012
Journal Name
Journal Of Baghdad College Dentistry
An evaluation of water absorption of Giomer in comparison to other resin-based restorative materials
...Show More Authors

Background: Polymeric composites have been widely used as dental restorative materials. A fundamental knowledge and understanding of the behavior of these materials in the oral cavity is essential to improve their properties and performance. The goal of this study was to measure water sorption of four composite resins containing different filler and resin matrix contents. Materials and method: Resin composite specimens giomer (Beautifil II) Filtek™ P90, Filtek™ Z350 XT, and Tetric N Ceram were prepared in a cylindrical mould of 3mm thickness and 6mm diameter (n=10) and light cured . All specimens placed in silica-gel desiccators at 37˚C for seven days, a constant weight was obtained. All samples were immersed in deionized distill

... Show More
Publication Date
Sun Aug 20 2023
Journal Name
Baghdad Science Journal
Biosynthesis, Characterization, Adsorption and Antimicrobial studies of Manganese oxide Nanoparticles Using Punica Granatum Extract
...Show More Authors

Manganese sulfate and Punica granatum plant extract were used to create MnO2 nanoparticles, which were then characterized using techniques like Fourier transform infrared spectroscopy, ultraviolet-visible spectroscopy, atomic force microscopy, X-ray diffraction, transmission electron microscopy, scanning electron microscopy, and energy-dispersive X-ray spectroscopy. The crystal's size was calculated to be 30.94nm by employing the Debye Scherrer equation in X-ray diffraction. MnO2 NPs were shown to be effective in adsorbing M(II) = Co, Ni, and Cu ions, proving that all three metal ions may be removed from water in one go. Ni(II) has a higher adsorption rate throughout the board. Co, Ni, and Cu ion removal efficiencies were 32.79%, 75

... Show More
View Publication
Scopus (5)
Crossref (7)
Scopus Clarivate Crossref