Preferred Language
Articles
/
fYb_s4QBIXToZYALO0hd
Design and numerical verification of a polarization-independent grating coupler using a double-layer approach for visible wavelengths applications
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Mar 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Dual Measurements of Pressure and Temperature With Fiber Bragg Grating Sensor
...Show More Authors

Abstract

The fiber Bragg grating (FBG) technology has been rapidly applied in the sensing technology field. In this work, uniform FBG was used as pressure sensor based on measuring related Bragg wavelength shift. The pressure was applied directly by air compressor to the sensor and the pressure was ranged from 1 to 6 bar.

      This sensor also was affected by the external temperature so as a result it could be used as a temperature sensor. This sensor could be used to monitor the pressure of dams. It has been shown from the result that the sensor is very sensitive to the pressure and the sensitivity was (67 pm\bar) and is very sensitive to temperature and the sensitivity was (10p

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 07 2021
Journal Name
Review Of International Geographical Education Online
Assessment of Information Security Risk Management System based on ISO/IEC27005 in the Independent High Electoral Commission: A Case Study
...Show More Authors

The current research aims to study the extent to which the Independent High Electoral Commission applies to information security risk management by the international standard (ISO / IEC27005) in terms of policies, administrative and technical procedures, and techniques used in managing information security risks, based on the opinions of experts in the sector who occupy positions (General Manager The directorate, department heads and their agents, project managers, heads of divisions, and those authorized to access systems and software). The importance of the research comes by giving a clear picture of the field of information security risk management in the organization in question because of its significant role in identifying risks and s

... Show More
View Publication Preview PDF
Scopus
Publication Date
Mon Oct 01 2018
Journal Name
Iraqi Journal Of Physics
Using the plastic wastes in fabrication of composite materials for different applications
...Show More Authors

This study suggests using the recycled plastic waste to prepare the polymer matrix composite (PMCs) to use in different applications. Composite materials were prepared by mixing the polyester resin (UP) with plastic waste, two types of plastic waste were used in this work included polyethylene-terephthalate (PET) and Polyvinyl chloride (PVC) with varies weight fractions (0, 5, 10, 15, 20 and 25 %) added as a filler in flakes form. Charpy impact test was performed on the prepared samples to calculate the values of impact strength (I.S). Flexural and hardness tests were carried out to calculate the values of flexural strength and hardness. Acoustic insulation and optical microscope tests were carried out. In general, it is found that UP/PV

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Sep 20 2023
Journal Name
International Journal Of Dentistry
Improving Surface Properties of PEEK for Dental Applications by Using Piranha Solution
...Show More Authors

Background. “Polyetheretherketone (PEEK)” is a biocompatible, high-strength polymer that is well-suited for use in dental applications due to its unique properties. However, achieving good adhesion between PEEK and hydrophilic materials such as dental adhesives or cement can be challenging. Also, this hydrophobicity may affect the use of PEEK as an implant material. Surface treatment or conditioning is often necessary to improve surface properties. The piranha solution is the treatment of choice to be explored for this purpose. Methods. PEEK disks of 10 mm diameter and 2 mm thickness were used in this study. Those samples were divided into five groups (each group has five samples). The first is the control group, in which no

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Feb 20 2018
Journal Name
Reporters, Markers, Dyes, Nanoparticles, And Molecular Probes For Biomedical Applications X
Dual-radiolabeled nanoparticle probes for depth-independent in vivo imaging of enzyme activation
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
Designing a Microstrip Patch Antenna in Part of Ultra-Wideband Applications
...Show More Authors

In this work, a simulated study was carried out for designing a novel spiral rectangular patch of microstrip antenna that is used in ultra-wideband applications by using a high frequency structure simulator software (HFSS). A substrate with dielectric constant of 4.4 and height 2.10 mm (commercial substrate height available is about 0.8-1.575 mm) has been used for the design of the proposed antenna. The design basis for enhancing bandwidth in the frequency range 6.63 - 10.93 GHz is based on increasing the edge areas that positively affect the antenna's efficiency. This design makes the designed antenna cost less by reducing the area of the patch. It has been noticed that the bandwidth of the antenna under this study is increasing to 4.30

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Al-adab Journal
A Pragmatic Analysis of Implicatures in Covid-19 Coronavirus English Jokes: A Neo-Gricean Approach
...Show More Authors

Publication Date
Fri Jun 30 2023
Journal Name
Journal Of The College Of Education For Women
Investigating The Ideology of Bullying in Hunt’s Fish in a Tree: A Critical Stylistic Approach
...Show More Authors

         Language always conveys ideologies that represent an essential aspect of the world we live in. The beliefs and opinions of an individual or community can be organized, interacted with, and negotiated via the use of language. Recent researches have paid attention to bullying as a social issue. They have focused on the psychological aspect of bullying rather than the linguistic one. To bridge this gap, the current study is intended to investigate the ideology of bullying from a critical stylistic perspective. The researchers adopt Jeffries' (2010) critical stylistics model to analyze the data which is five extracts taken from Hunt’s Fish in a Tree (2015). The analysis demonstrates

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Plant Archives
Effect of soil salinity on spectral reflectance of red and nir wavelengths in al-salamiyat project
...Show More Authors

Scopus (8)
Scopus