Preferred Language
Articles
/
ehezWJABVTCNdQwCVofU
Carbon nanotubes on a spider silk scaffold
...Show More Authors

Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of The College Of Education For Women
Geopolitical dimensions to build a dam on the downstream Renaissance (Egypt and Sudan)
...Show More Authors

Varied uses of international rivers in the past few decades dramatically, resulting in this multiplicity of uses and all associated with it for the occurrence of freshwater scarcity activities, and thus an increase in conflicts and disputes around on the rights of each of the riparian countries to benefit from the waters of the river at various purposes, particularly the establishment of dams on some of them as is the case (Renaissance Ethiopian) big impact on downstream countries Dam (Egypt and Sudan), due to the Oukuahma at the end of the Nile Valley made them vulnerable to environmental fluctuations, political crises facing the Nile basin countries, and any reduction in the proportion of water is not only the Nile River, but for all r

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 22 2022
Journal Name
Fine Art Journal
Spatial relationships and their impact on monumental sculptures (arab capitals as a model)
...Show More Authors

The current research deals with spatial relations as a tool to link urban landmarks in a homogeneous composition with monumental sculptures, by identifying these landmarks and the extent of their impact on them, which constitutes an urgent need to evaluate the appropriate place and its effects on them, so that this analytical study is a critical approach adopted in artistic studies of monumental models in Arabcapitals .The current research came in four chapters, the first chapter of which dealt with the research problem, its importance and the need for it, then its objectives that were determined in revealing the spatial relations and their impact on

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 31 2020
Journal Name
College Of Islamic Sciences
Ruling on conducting a marriage contract through modern means of communication Juristic study
...Show More Authors

 

This research dealt with highlighting the images of marriage through the modern means of communication and the legal ruling for it. Dowry even be knotted on them; because they are then one of the parties to the contract and contracted in one contract, and this is prohibited by law and law and common sense.

It turns out that it is permissible to advertise marriage through the Internet in accordance with the rules and standards that preserve values ​​and morals and safeguard dignity and chastity. The acts in Islamic law are vested with intentions. If intentions are true, then the act is true, and Internet marriage is what falls under this order.<

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Tue Jul 08 2025
Journal Name
Magazine Aldhakwat Albedh
The impact of atheism on the individual and society, Iraq as a model
...Show More Authors

Atheists have spread in the modern era, so that atheism has become a bad phenomenon in the world in general and in Islamic societies in particular, so the research aims to study the individual and social effects left by atheism on the atheists themselves, and the research included multiple axes: atheism linguistically and idiomatically, atheism in the Qur’an Noble and Modern (and Contemporary) Atheism Statistics: and the reasons for atheism: Studying the phenomenon of atheism in Iraq as a model, then studying the effects of atheism: on the individual first, then atheism and its impact on society, then the conclusion, recommendations, sources and references

View Publication Preview PDF
Publication Date
Thu May 18 2023
Journal Name
College Of Islamic Sciences
a base The origin of permissive things And its impact on Islamic law
...Show More Authors

So I present in the hands of the honorable reader what God Almighty has made easy for me in terms of what I dealt with in the rule (the principle of permissive things) and what branches from it and what is related to it.
This research was divided into an introduction, a preface, three demands, and a conclusion.
The preamble is to explain the meaning of the rule in language and terminology and the definition of the legal rule and what is related to it. The first requirement is to explain the rule that we have in our hands and the words related to its text - and is it a fundamentalist or jurisprudential rule? .
As for the second requirement - in the difference of scholars and their opinions in whether the origin of things is permi

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 04 2019
Journal Name
Iraqi Journal Of Physics
A study of the Zn:Sn mixing ratio effect on the gas detector properties
...Show More Authors

Semiconductor-based metal oxide gas detector of five mixed from zinc chloride Z and tin chloride S salts Z:S ratio 0, 25, 50, 75 and 100% were fabricated on glass substrate by a spray pyrolysis technique. With thickness were about 0.2 ±0.05 μm using water soluble as precursors at a glass substrate temperature 500 ºC±5, 0.05 M, and their gas sensing properties toward CH4, LPG and H2S gas at different concentration (10, 100, 1000 ppm) in air were investigated at room temperature which related with the petroleum refining industry.
Furthermore structural and morphology properties were scrutinize. Results shows that the mixing ratio affect the composition of formative oxides were (ZnO, Zn2SnO4, Zn2SnO4+ZnSnO3, ZnSnO3, SnO2) ratios ment

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Estimation of a Parallel Stress-strength Model Based on the Inverse Kumaraswamy Distribution
...Show More Authors

   

 The reliability of the stress-strength model attracted many statisticians for several years owing to its applicability in different and diverse parts such as engineering, quality control, and economics. In this paper, the system reliability estimation in the stress-strength model containing Kth parallel components will be offered by four types of shrinkage methods: constant Shrinkage Estimation Method, Shrinkage Function Estimator, Modified Thompson Type Shrinkage Estimator, Squared Shrinkage Estimator. The Monte Carlo simulation study is compared among proposed estimators using the mean squared error. The result analyses of the shrinkage estimation methods showed that the shrinkage functions estimator was the best since

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (4)
Scopus Crossref