Preferred Language
Articles
/
ehezWJABVTCNdQwCVofU
Carbon nanotubes on a spider silk scaffold
...Show More Authors

Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 30 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
RATIONALIZATION OF CONSUMPTION AND ITS IMPACT ON ECONOMIC DEVELOPMENT (A PRELIMINARY STUDY): RATIONALIZATION OF CONSUMPTION AND ITS IMPACT ON ECONOMIC DEVELOPMENT (A PRELIMINARY STUDY)
...Show More Authors

The research deals with the concept of rationalization of consumption, which is legitimately legitimized, by indicating the permissibility of consumption and its limits in Islam, the legitimate aspects of spending and its controls, and the concept of development in the Islamic economy. The researcher followed the descriptive method by presenting the legal texts and jurisprudential opinions and linking them to contemporary economic problems.The research has reached several conclusions, the most important of which is that the goal of Islam in relation to consumption is to inform the Muslim of the amount of economic maturity, and the truth of alms is good in money and religion. It is necessary for achieving maturity that both means

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
Effect of a Parked Car Orientation on a Temperature Distribution and Cooling Load Calculation: Experimental Study
...Show More Authors

When a vehicle is left parked in the sun for an extended period, the gathered heat causes damage to several interiors within the cabin and causes discomfort for people and animals left inside the car. In the present work, the effect of the orientation of a parked white minibus on temperature distribution and cooling load calculation is studied experimentally in an open environment. Two different cases were studied facing south and facing east. For several hours, the temperature inside the car cabin had been monitored and measured at five separate locations. The cooling load calculations are carried out based on the experimental measurements. The results show that the overheating of parked cars always happens as a result

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Nov 01 2023
Journal Name
Journal Of Modern Project Management
THE IMPACT OF STRATEGIC INTELLIGENCE ON ORGANIZATIONAL PERFORMANCE: A TEXTILE SECTOR PERSPECTIVE OF A DEVELOPING ECONOMY
...Show More Authors

In today’s competitive environment, organizational efficiency and sustained growth are crucial for survival. The performance of an organization is intricately connected to strategic planning, prompting firms to gather and leverage competitive information for a competitive advantage. Senior managers, recognizing this, initiate actions accordingly. This study aims to investigate the relationship between foresight, vision, strategic partnerships, motivation, system thinking, and organizational performance. Data, gathered through a self-administered questionnaire from various textile units, were analysed using structural equation modelling (SEM). The findings indicate that sub-constructs of strategic intelligence positively impact organizatio

... Show More
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed audit program for a comprehensive electronic banking system based on business risks : applied research
...Show More Authors

The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of whi

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 08 2019
Journal Name
Iraqi Journal Of Laser
Writing of a Bragg Grating on a D-shaped Optical Fiber Using the KrF Excimer Laser
...Show More Authors

Fiber Bragg Grating has many advantages where it can be used as a temperature sensor, pressure sensor or even as a refractive index sensor. Designing each of this fiber Bragg grating sensors should include some requirements. Fiber Bragg grating refractive index sensor is a very important application. In order to increase the sensing ability of fiber Bragg gratings, many methods were followed. In our proposed work, the fiber Bragg grating was written in a D-shaped optical fiber by using a phase mask method with KrFexcimer. The resultant fiber Bragg grating has a high reflectivity 99.99% with a Bragg wavelength of 1551.2 nm as a best result obtained from a phase mask with a grating period of 1057 nm. In this work it was found that the rota

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Physics: Conference Series
The Fear Effect on a Food Chain Prey-Predator Model Incorporating a Prey Refuge and Harvesting
...Show More Authors
Abstract<p>In this paper, we investigate the impact of fear on a food chain mathematical model with prey refuge and harvesting. The prey species reproduces by to the law of logistic growth. The model is adapted from version of the Holling type-II prey-first predator and Lotka-Volterra for first predator-second predator model. The conditions, have been examined that assurance the existence of equilibrium points. Uniqueness and boundedness of the solution of the system have been achieve. The local and global dynamical behaviors are discussed and analyzed. In the end, numerical simulations are confirmed the theoretical results that obtained and to display the effectiveness of varying each parameter</p> ... Show More
View Publication
Scopus (15)
Crossref (11)
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Iop Conference Series: Earth And Environmental Science
A Review on Induced Electro-Fenton Process for Wastewater Treatment
...Show More Authors
Abstract<p>Induced EF is among the most important of advanced oxidation processes (AOPs) It was employed to treat different kinds of wastewater. In the present review, the types and mechanism of induced EF were outlined. Parameters affecting this process have been mentioned with details. These are current density, pH, H<sub>2</sub>O<sub>2</sub> concentration, and time. The application of induced electro Fenton in various sectors of industries like textile, petroleum refineries, and pharmaceutical were outlined. The outcomes of this review demonstrate the vital role of induced EF in treatment of wastewater at high efficiency and low cost in contrast with conventional technique</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Defence Technology
A novel facial emotion recognition scheme based on graph mining
...Show More Authors

Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. T

... Show More
View Publication Preview PDF
Scopus (48)
Crossref (39)
Scopus Clarivate Crossref