Preferred Language
Articles
/
ijl-202
Electronically Implementation and Detection of Pulse Laser from Continuous Laser Diode
...Show More Authors

This research aims to design a high-speed laser diode driver and photodetector, the result is the
design of the high-speed laser diode driver with a short pulse of 10 ns at 30 KHz frequency and the
delivered maximum pulse voltage is 5.5 mV. Also, its optical output power of the laser diode driver is
about 2.529 mW for the centroied wavelength 1546.7 nm with FWHM of 286 pm and (1270-1610) nm.
The design of the circuit based on bipolar transistor where the input pulse signal is simply generated by
an arduino kit with 15 kHz frequency and then compensated to trigger to small signal amplifier which
was is simply NPN C3355 transistor and the output is a current driver to the laser diode. OptiSystem
software and Electronic Workbench tools were used for the design of high speed laser diode diver and its
simulation

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 09 2015
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
The effect of different thermal treatments and pH on the stability of a glycyrrhizin which Product from the licorice plant, Glycyrrhiza glabra L: The effect of different thermal treatments and pH on the stability of a glycyrrhizin which Product from the licorice plant, Glycyrrhiza glabra L
...Show More Authors

The plant licorice is considered important plants as nutritionally and medically and economically, as a rich in phytochemical, vitamins and minerals, and being widely available, Research indicated the presence of many nutrients such as (proteins, Carbohydrates, vitamins and minerals) as well as presence of Glycyrrhizin which responsible of sweet taste, that allowing the possibility to use it as natural intensity sweetener with few calories in Sweetening of many food. This research is aimed to study the Stability of Glycyrrhizin toward the various manufacturing conditions such as (thermal treatment, pH of foods and microwaves), so three factorial experiments was implemented to find out the Stability as following: 100C° - 121C° - Microwa

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fifth International Conference On Applied Sciences: Icas2023
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 20 2022
Journal Name
2022 4th International Conference On Current Research In Engineering And Science Applications (iccresa)
Noise Detection and Removing in Heart Sound Signals via Nuclear Norm Minimization Problems
...Show More Authors

Heart sound is an electric signal affected by some factors during the signal's recording process, which adds unwanted information to the signal. Recently, many studies have been interested in noise removal and signal recovery problems. The first step in signal processing is noise removal; many filters are used and proposed for treating this problem. Here, the Hankel matrix is implemented from a given signal and tries to clean the signal by overcoming unwanted information from the Hankel matrix. The first step is detecting unwanted information by defining a binary operator. This operator is defined under some threshold. The unwanted information replaces by zero, and the wanted information keeping in the estimated matrix. The resulting matrix

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Fabrication of Electrospun Nanofibers Membrane for Emulsified Oil Removal from Oily Wastewater
...Show More Authors

The electrospun nanofibers membranes have gained considerable interest in water filtration applications. In this work, the fabrication and characterization of the electrospun polyacrylonitrile-based nonwoven nanofibers membrane are reported. Then, the membrane's performance and antifouling properties were evaluated in removing emulsified oil using a cross flow filtration system. The membranes were fabricated with different polyacrylonitrile (PAN) concentrations (8, 11, and 14 wt. %) in N, N-Dimethylformamide (DMF) solvent resulted in various average fiber sizes, porosity, contact angle, permeability, oil rejection, and antifouling properties. Analyses of surface morphology of the fabricated membranes before and after oil removal revealed

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Protection of Galvanized steel from corrosion in salt media using sulfur nanoparticles
...Show More Authors

                The characteristics of sulfur nanoparticles were studied by using atomic force microscope (AFM) analysis. The atomic force microscope (AFM) measurements showed that the average size of sulfur nanoparticles synthesized using thiosulfate sodium solution through the extract of cucurbita pepo extra was 93.62 nm. Protecting galvanized steel from corrosion in salt media was achieved by using sulfur nanoparticles in different temperatures. The obtained data of thermodynamic in the presence of sulfur nanoparticles referred to high value as compares to counterpart in the absence of sulfur nanoparticles, the high inhibition efficiency (%IE) and corrosion resistance were at high temperature, the corrosion rate or weig

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (4)
Scopus Clarivate Crossref