Preferred Language
Articles
/
ijcpe-661
Catalytic Reduction of NOx using Locally Prepared Catalysts with Ammonia
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 13 2018
Journal Name
Baghdad Science Journal
The Structure and Optical Properties of Ag doped CdO Thin Film Prepared by Pulse Laser Deposition (PLD)
...Show More Authors

At a temperature of 300 K, a prepared thin film of Ag doped with different ratios of CdO (0.1, 0.3, 0.5) % were observed using pulse laser deposition (PLD). The laser, an Nd:YAG in ?=1064 nm, used a pulse, constant energy of 600 mJ ,with a repetition rate of 6 Hz and 400 pulses. The effect of CdO on the structural and optical properties of these films was studied. The structural tests showed that these films are of a polycrystalline structure with a preferred orientation in the (002) direction for Ag. The grain size is positively correlated with the concentration of CdO. The optical properties of the Ag :CdO thin film we observed included transmittance, absorption coefficient, and the energy gap in the wavelength range of 300-1100

... Show More
View Publication Preview PDF
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Apr 26 2020
Journal Name
Iraqi Journal Of Science
Synthesis and characterization of silver oxide nanoparticles prepared by chemical bath deposition for NH3 gas sensing applications
...Show More Authors

Nano-silver oxide thin films with high sensitivity for NH3 gas were deposited on glass substrates by the chemical bath deposition technique. The preparations were made under different values of pH and deposition time at 70áµ’ C, using silver nitrate AgNO3 and triethanolamine. XRD analysis showed that all thin films were
polycrystalline with several peaks of silver oxides such as Ag2O, AgO and Ag3O4, with an average crystallite size that ranged between 31.7 nm and 45.8 nm, depending on the deposition parameters. Atomic force microscope (AFM) technique illustrated that the films were homogenous with different surface roughness and the
grain size ranged between 55.69 nm and 86.23 nm. The UV-Vis spectrophotometer showed that the op

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Wed Aug 30 2023
Journal Name
Iraqi Journal Of Science
Adsorption of Azo Dye Onto TiO2 Nanoparticles Prepared by a Novel Green Method: Isotherm and Thermodynamic Study
...Show More Authors

     The current study examined the use of Sansevieria plant leaves extract as an environmentally acceptable, inexpensive, and safe green approach for creating titanium dioxide nanoparticles (NPs). Batch studies have been used to test the particles' capacity to bind to the azo dye congo red (CR), which has been adsorbed from its aqueous solution. The effects of many factors, including the weight of TiO2 NPs, the contact duration to reach equilibrium, the concentration of CR, temperature, and pH, have been investigated. Both the Freundlich and Langmuir models were used to analyze experimental results. According to the high values of the Freundlich model's correlation coefficient R2, it is discovered that th

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Mon May 16 2016
Journal Name
Far East Journal Of Mathematical Sciences (fjms)
MINIMIZING WAITING TIMES USING MULTIPLE FUZZY QUEUEING MODEL WITH SUPPLY PRIORITIES
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Mar 01 2012
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Predicting changes on budget expenditures using Markov chains with practical application
...Show More Authors

The researchers have a special interest in studying  Markov  chains as one of the probability samples which has many applications in different fields. This study comes to deal with the changes issue that happen on budget expenditures by using statistical methods, and Markov chains is the best expression about that as they are regarded reliable  samples in the prediction process. A transitional matrix is built for three expenditure cases (increase ,decrease ,stability) for one of budget expenditure items (base salary) for three directorates (Baghdad ,Nineveh , Diyala) of one  of the ministries. Results are analyzed by applying  Maximum likelihood estimation  and Ordinary least squares  methods resulting

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Communications In Computer And Information Science
Audio Compression Using Transform Coding with LZW and Double Shift Coding
...Show More Authors

Home New Trends in Information and Communications Technology Applications Conference paper Audio Compression Using Transform Coding with LZW and Double Shift Coding Zainab J. Ahmed & Loay E. George Conference paper First Online: 11 January 2022 126 Accesses Part of the Communications in Computer and Information Science book series (CCIS,volume 1511) Abstract The need for audio compression is still a vital issue, because of its significance in reducing the data size of one of the most common digital media that is exchanged between distant parties. In this paper, the efficiencies of two audio compression modules were investigated; the first module is based on discrete cosine transform and the second module is based on discrete wavelet tr

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
...Show More Authors

Recently, with the development multimedia technologies and wireless telecommunication, Voice over Internet Protocol, becomes widely used in communication between connecting people, VoIP allows people that are connected to the local network or the Internet to make voice calls using digital connection instead of based on the analog traditional telephone network. The technologies of Internet doesn’t give any security mechanism and there is no way to guarntee that the voice streams will be transmitted over Internet or network have not been intercepted in between. In this paper, VoIP is developed using stream cipher algorithm and the chaotic cryptography for key generator. It is based on the chaotic maps for generating a one-time rando

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 16 2022
Journal Name
2022 Muthanna International Conference On Engineering Science And Technology (micest)
A hybrid feature selection technique using chi-square with genetic algorithm
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Offline Signature Biometric Verification with Length Normalization using Convolution Neural Network
...Show More Authors

Offline handwritten signature is a type of behavioral biometric-based on an image. Its problem is the accuracy of the verification because once an individual signs, he/she seldom signs the same signature. This is referred to as intra-user variability. This research aims to improve the recognition accuracy of the offline signature. The proposed method is presented by using both signature length normalization and histogram orientation gradient (HOG) for the reason of accuracy improving. In terms of verification, a deep-learning technique using a convolution neural network (CNN) is exploited for building the reference model for a future prediction. Experiments are conducted by utilizing 4,000 genuine as well as 2,000 skilled forged signatu

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref