Preferred Language
Articles
/
ghZyyIoBVTCNdQwCq6Un
Immobilization of cobalt ions using hierarchically porous 4A zeolite-based carbon composites: Ion-exchange and solidification
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Physics (ijp)
Structural and Infrared Spectroscopy of Polyvinylpyrrolidone/Multi-walled Carbon Nanotubes Nanocomposite
...Show More Authors

In this work, polyvinylpyrrolidone (PVP)/ Multi-walled carbon nanotubes (MWCNTs) nanocomposites were prepared with two concentrations of MWCNTs by casting method. Morphological, structural characteristics and electrical properties were investigated. The state of MWCNTs dispersion in a PVP matrix was indicated by Field Effect-Scanning Electron Microscopy (FESEM) which showed a uniform dispersion of MWCNTs within the PVP matrix. X-ray Diffraction (XRD) indicate strong bonding of carbonyl groups of PVP composite chains with MWCNTs. Fourier transfer infrared (FTIR) studies shows characteristics of various stretching and bending vibration bands, as well as shifts in some band locations and intensity changes in others. Hall effect was stu

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Modification, Characterization of Tea Residue-derived Activated Carbon, and Ciprofloxacin Adsorption
...Show More Authors

تقدم هذه الدراسة وصفا للطريقة المستخدمة في تحضير الكربون المنشط  (AC)من بقايا الشاي. تم دراسة الخواص الفيزيائية والكيميائية وكفاءة الامتزاز للكربون المنشط المحضر. تم إنتاج الكربون المنشط (AC) على مرحلتين: الاولى التنشيط باستخدام حامض الفوسفوريك (H3PO4) والثانية الكربنة عند درجة حرارة 450 درجة مئوية. استخدم الكربون المنشط لغرض امتصاص العقار الدوائي السيبروفلوكساسين(CIP) . تمت  دراسة عدة عوامل تشغيلية  بدرجة حرار

... Show More
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Modification, Characterization of Tea Residue-derived Activated Carbon, and Ciprofloxacin Adsorption
...Show More Authors

تقدم هذه الدراسة وصفا للطريقة المستخدمة في تحضير الكربون المنشط  (AC)من بقايا الشاي. تم دراسة الخواص الفيزيائية والكيميائية وكفاءة الامتزاز للكربون المنشط المحضر. تم إنتاج الكربون المنشط (AC) على مرحلتين: الاولى التنشيط باستخدام حامض الفوسفوريك (H3PO4) والثانية الكربنة عند درجة حرارة 450 درجة مئوية. استخدم الكربون المنشط لغرض امتصاص العقار الدوائي السيبروفلوكساسين(CIP) . تمت  دراسة عدة عوامل تشغيلية  بدرجة حرار

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Thu Nov 25 2021
Journal Name
Engineering And Technology Journal
Pentacene Based Organic Field Effect Transistor Using Different Gate Dielectric
...Show More Authors

This paper presents the electrical behavior of the top contact/ bottom gate of an organic field-effect transistor (OFET) utilizing Pentacene as a semiconductor layer with two distinctive gate dielectric materials Polyvinylpyrrolidone (PVP) and Zirconium oxide (ZrO2) were chosen. The influence of the monolayer and bilayer gates insulator on OFET performance was investigated. MATLAB software was used to simulate and determine the electrical characteristics of a device. The output and transfer characteristics were studied for ZrO2, PVP and ZrO2/PVP as an organic gate insulator layer. Both characteristics show a high drain current at the gate dielectric ZrO2/PVP equal to -0.0031A and -0.0015A for output and transfer characteristics respectively

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (18)
Crossref (12)
Scopus Crossref
Publication Date
Sun Apr 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Information Hiding using LSB Technique based on Developed PSO Algorithm
...Show More Authors

<p>Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most effi

... Show More
View Publication
Scopus (19)
Crossref (5)
Scopus Crossref