Preferred Language
Articles
/
ijl-184
Experimental Study of Spatial Self-Phase Modulation (SSPM) Based on Laser Beam and Hybrid Functionalized Carbon Nanotubes/Silver Nanoparticles (F-Mwcnts/Ag-Nps) Acetone Suspensions
...Show More Authors

Focusing of Gaussian laser beam through nonlinear media can induce spatial self- phase modulation which forms a far field intensity pattern of concentric rings. The nonlinear refractive index change of material depends on the number of pattern rings. In this paper, a formation of tunable nonlinear refractive index change of hybrid functionalized carbon nanotubes/silver nanoparticles acetone suspensions (F-MWCNTs/Ag-NPs) at weight mixing ratio of 1:3 and volume fraction of 6x10-6 , 9x10-6 , and 18x10-6 using laser beam at wavelength of 473nm was investigated experimentally. The results showed that tunable nonlinear refractive indices were obtained and increasing of incident laser power density led to increase the nonlinear refractive index changes of suspension at each volume fraction. Moreover, the nonlinear refractive index changes ( Δnnl,max ) at volume fraction of 18x 10-6 irradiated by various laser intensities (137.31, 200, 228, 268, and 366.61 W/cm2) have higher value than others.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Feb 13 2021
Journal Name
Journal Of Lasers In Medical Sciences
Effects of Different Laser Treatments on Some Properties of the Zirconia-Porcelain Interface
...Show More Authors

Introduction: This study was performed to compare the effect of Fractional CO2 laser or Q switched Nd:YAG laser of surface treatment on the shear bond strength of zirconia-porcelain interface. Methods: Fractional CO2 laser at 30 W, 2 ms, time interval 1 ms, distance between spots 0.3 mm, and number of scans is (4) or Q switched Nd:YAG laser at 30 J/mm2 and 10 Hz were used to assess the shear bond strength of zirconia to porcelain. Pre-sintered zirconia specimens were divided into three groups (n = 10) according to the surface treatment technique used: (a) untreated (Control) group; (b) CO2 group; (c) Nd:YAG group. All samples were then sintered and veneered with porcelain according to the manufacturer’s instructions. Surface morph

... Show More
View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Knowledge Management in Saudi Universities Applied study in Shaqra University
...Show More Authors

  This research aims  to know the reality of  implementation of  Knowledge Management in Saudi Universities Applied  in Shaqra University and to study the difficults whish encountered in applying the Knowledge Management approach.

The study investigated the university staff  in Shaqra, Thadig, and Huraymila branches,  using a questionnaire designed by the researcher to collect the data, sample of (260) members was used, applying the descriptive analytical approach to test the hypothesis by using (SPSS) program.

The study revealed that the first four zero hypothesis are rejected because there is medium approval of the university members on the fo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Journal Of Baghdad College Of Dentistry
Effect of adding titanium dioxide nanoparticles on anti-microbial activity and surface detail reproduction of dental alginate
...Show More Authors

Most dental works require a diagnostic impression; alginate is contemplated as the most popular material used for this purpose. Titanium dioxide nanoparticles show evidence of antimicrobial activity in the recent era, for this purpose, this study aimed to evaluate the effect of adding Titanium dioxide nanoparticles on antimicrobial activity and surface detail reproduction of alginate impression material. Materials and methods: Titanium dioxide nanoparticles (purity = 99%, size= 20nm) was added to alginate at three different concentrations (2%, 3% and 5%). 84 samples were prepared in total. Samples were tested for antimicrobial activity using a disc diffusion test, and surface detail reproduction was done using (ISO 21563:2021). One-way A

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jan 31 2026
Journal Name
Modern Sport
Altmtip impact exercises in raising the dynamic range of the skill of the backward straight step down on the balance beam.
...Show More Authors

View Publication
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
Experimental Study of Power Increase Transient in Heat Generation Systems Simulated By Immersed Heat Source
...Show More Authors

Theoretical and experimental investigations of the transient heat transfer parameters of constant heat flux source subjected to water flowing in the downward direction in closed channel are conducted. The power increase transient is ensured by step change increase in the heat source power. The theoretical investigation involved a mathematical modeling for axially symmetric, simultaneously developing laminar water flow in a vertical annulus. The mathematical model is based on one dimensional downward flow. The boundary conditions of the studied case are based on adiabatic outer wall, while the inner wall is subjected to a constant heat flux. The heat & mass balance equation derived for specified element of bulk water within the annulu

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 02 2022
Journal Name
Frontiers In Built Environment
Thermal analysis of horizontal earth-air heat exchangers in a subtropical climate: An experimental study
...Show More Authors

The earth-air heat exchanger (EHX) has a promising potential to passively save the energy consumption of traditional air conditioning systems while maintaining a high degree of indoor comfort. The use of EHX systems for air conditioning in commercial and industrial settings offers several environmental benefits and is capable of operating in both standalone and hybrid modes. This study tests the performance and effectiveness of an EHX design in a sandy soil area in Baghdad, Iraq. The area has a climate of the subtropical semi-humid type. Ambient air temperatures and soil temperatures were recorded throughout the months of 2021. During the months of January and June, the temperatures of the inlet and outflow air at varying air veloci

... Show More
View Publication
Scopus (12)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
A Modified Vigenère Cipher based on Time and Biometrics features
...Show More Authors

Biometrics is widely used with security systems nowadays; each biometric modality can be useful and has distinctive properties that provide uniqueness and ambiguity for security systems especially in communication and network technologies. This paper is about using biometric features of fingerprint, which is called (minutiae) to cipher a text message and ensure safe arrival of data at receiver end. The classical cryptosystems (Caesar, Vigenère, etc.) became obsolete methods for encryption because of the high-performance machines which focusing on repetition of the key in their attacks to break the cipher. Several Researchers of cryptography give efforts to modify and develop Vigenère cipher by enhancing its weaknesses.

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref