Preferred Language
Articles
/
ehezWJABVTCNdQwCVofU
Carbon nanotubes on a spider silk scaffold
...Show More Authors

Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Effect of sustainable palm fiber on high strength concrete properties
...Show More Authors
Abstract<p>Date palm fiber is one of the common wastes available in the M. E. countries essentially Iraq. The aim of search to investigate the performance and effects of fiber date palm on the mechanical properties of high strength concrete, this fiber was used in three ratio 2, 4 and 6 % by vol. of concrete at ages of (7, 28, 90) days. Results demonstrated improvement in the compressive strength increased 19.2 %, 23.6%, 24.9 % for 2%, 4%, 6% of fiber respectively at age 28 days. Flexural strength increases 47.6%, 66.2%, 93.8% form (2,4,6) % of fiber respectively at age 28 days. Density increase about 0.41%, 0, 61 % 0.69 % for (2,4,6) % of fiber respectively at age 28. Absorption water decrease </p> ... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Wed Jun 17 2015
Journal Name
جامعة المستنصرية
study of some aspect on Iraqi children with Atopic Dermatitis
...Show More Authors

Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Deterministic Analysis of Wind Loads Effects on High-Rise Buildings
...Show More Authors

This paper studies the effect of mean wind velocity on tall building. Wind velocity, wind profile and wind pressure have been considered as a deterministic phenomenon. Wind velocity has been modelled as a half-sinusoidal wave. Three exposures have been studied B, C, and D. Wind pressure was evaluated by equation that joined wind pressure with mean wind velocity, air density, and drag coefficient.

Variations of dynamic load factor for building tip displacement and building base shear were studied for different building heights, different mode shapes, different terrain exposures, and different aspect ratios of building plan. SAP software, has been used in modelling and dynamic analysis for all case studies.

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2019
Journal Name
Journal Of Engineering
Adsorption of Methylene Blue on Prepared Charcoal from Molasses Waste
...Show More Authors

Recently, important efforts have been made in an attempt to search for the cheapest and ecofriendly alternatives adsorbents. In the present work, waste molasses from Iraqi date palm (Zahdi) had been used as a provenance to produce charcoal for the removal of methylene blue (MB) dye from water. The optimum prepared charcoal was obtained at 150 C, by increasing temperature to 175 C, the charcoal had almost converted to ash. The obtained charcoal have been inspected for properties using scanning electron microscope (SEM), atomic force microscope (AFM), porosity and surface area. Adsorption data were optimized to Langmuir and Freundlich and adsorption parameters have been evaluated. The thermodynamic parameters like a change

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Employment of Titanium dioxide thin film on NO2 gas sensing
...Show More Authors
Abstract<p>TiO<sub>2</sub> thin films were deposited by Spray Pyrolysis with thickness ((350±25) nm) onto glass substrates at (350°C), and the film was annealed at temperatures (400 and 500)°C. The structural and morphological properties of the thin films (TiO<sub>2</sub>) were investigated by X-ray diffraction, Field emission scanning electron microscopy and atomic force microscope. The gas sensor fabricated by evaporating aluminum electrodes using the annealed TiO<sub>2</sub> thin films as an active material. The sensitivity of the sensors was determined by change the electrical resistance towards NO<sub>2</sub> at different working temperatures (200 </p> ... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sat Jan 19 2019
Journal Name
Artificial Intelligence Review
Survey on supervised machine learning techniques for automatic text classification
...Show More Authors

View Publication
Scopus (294)
Crossref (264)
Scopus Clarivate Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
Towards Accurate Pupil Detection Based on Morphology and Hough Transform
...Show More Authors

 Automatic recognition of individuals is very important in modern eras. Biometric techniques have emerged as an answer to the matter of automatic individual recognition. This paper tends to give a technique to detect pupil which is a mixture of easy morphological operations and Hough Transform (HT) is presented in this paper. The circular area of the eye and pupil is divided by the morphological filter as well as the Hough Transform (HT) where the local Iris area has been converted into a rectangular block for the purpose of calculating inconsistencies in the image. This method is implemented and tested on the Chinese Academy of Sciences (CASIA V4) iris image database 249 person and the IIT Delhi (IITD) iris

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (3)
Scopus
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus