Preferred Language
Articles
/
ehezWJABVTCNdQwCVofU
Carbon nanotubes on a spider silk scaffold
...Show More Authors

Understanding the compatibility between spider silk and conducting materials is essential to advance the use of spider silk in electronic applications. Spider silk is tough, but becomes soft when exposed to water. Here we report a strong affinity of amine-functionalised multi-walled carbon nanotubes for spider silk, with coating assisted by a water and mechanical shear method. The nanotubes adhere uniformly and bond to the silk fibre surface to produce tough, custom-shaped, flexible and electrically conducting fibres after drying and contraction. The conductivity of coated silk fibres is reversibly sensitive to strain and humidity, leading to proof-of-concept sensor and actuator demonstrations.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Applied Sciences And Nanotechnology
Characterization of Prepared Polyaniline Nanofibers Based on a Hydrothermal Variation of Aniline Concentration
...Show More Authors

Polyaniline nanofibers (PAni-NFs) have been synthesized under various concentrations (0.12, 0.16, and 0.2 g/l) of aniline and different times (2h and 3 h) by hydrothermal method at 90°C. Was conducted with the use of X-ray diffraction (XRD), Fourier Transform Infrared spectra (FTIR), Ultraviolet-Visible (UV-VIS) absorption spectra, Thermogravimetric Analysis (TGA), and Field Emission-Scanning Electron Microscopy (FE-SEM). The X-ray diffraction patterns revealed the amorphous nature of all the produced samples. FE-SEM demonstrated that Polyaniline has a nanofiber-like structure. The observed typical peaks of PAni were (1580, 1300-1240, and 821 cm-1 ), analyzed by the chemical bonding of the formed PAni through FTIR spectroscopy. Also, tests

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 06 2011
Journal Name
Baghdad Science Journal
The Calculation of the partical distribution function g(r12,r1) for Carbon Ion cases (C+2,C+3,C+4) in the position space
...Show More Authors

The aim of this work is study the partical distribution function g(r12,r1) for Carbon ion cases (C+2,C+3,C+4) in the position space using Hartree-Fock's Wave function, and the partitioning technique for each shell which is represented by Carbon Ions [C+2 (1s22s2)], [C+3 (1s22s)] and [C+4 (1s2)]. A comparision has been made among the three Carbon ions for each shell. A computer programs (MATHCAD ver. 2001i) has been used texcute the results.

View Publication Preview PDF
Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Water, Air, & Soil Pollution
Adsorptive Performance of High Surface Area Date Palm Bunch Activated Carbon Towards Methyl Violet and Fuchsin Basic Dyes Removal: Thermochemical Activation And Statistical Optimization
...Show More Authors

Herein, date palm (Phoenix dactylifera) bunch (DPB) waste was transformed into activated carbon (DPAC) adsorbent by using microwaveinduced ZnCl2 activation for 15 min at a power of 600 W. Several analytical methods were used to explain the physicochemical parameters of DPBAC including XRD, pHpzc, BET, SEM–EDX, and FTIR. Afterwards, the adsorptive performance of DPBAC was thoroughly investigated for the removal of two structurally different organic dyes namely methyl violet (MV) and fuchsin basic (FB). The key adsorption parameters, including the dose of DPBAC (A: 0.02–0.06 g), the solution pH (B: 4–10), and the contact time (C: 2–20 min) were statistically optimized using the Box-Behnken design with response surface methodology (RSM

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 05 2025
Journal Name
Water, Air, & Soil Pollution
Adsorptive Performance of High Surface Area Date Palm Bunch Activated Carbon Towards Methyl Violet and Fuchsin Basic Dyes Removal: Thermochemical Activation And Statistical Optimization
...Show More Authors

Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Simultaneous influences of hematocrit in the erythrocyte medium on erythrocyte aggregation and sedimentation: a kinetic study by a laser scattering technique
...Show More Authors

The erythrocyte aggregation is an important physiological phenomenon in the circulation of blood. It is a basic characteristic of normal blood that plays a major role in the cardiovascular system, especially in the microcirculation. This study explained the kinetics of single cells rouleaux formation one- dimensional aggregate and three- dimensional aggregate, during simultaneous, and the effect of hematocrit on the process of aggregation and sedimentation. The present study was done on forty one healthy subjects. Laser light is passed through a well mixed sample of blood and the forward scattered light intensities recorded continuously. The samples were prepared with different hematocrit, (10%, 15%, 20%, and 25%). Increasing

... Show More
View Publication Preview PDF
Crossref