Preferred Language
Articles
/
ijp-203
Performance of humidity sensor based on photonic crystal fiber interferometer
...Show More Authors

Photonic Crystal Fiber Interferometers (PCFIs) are greatly used
for sensing applications. This work presents the fabrication and
characterization of a relative humidity sensor based on Mach-
Zehnder Interferometer (MZI), which operates in reflection mode.
The humidity sensor operation based on the adsorption and
desorption of water vapour at the silica-air interface within the PCF.
The fabrication of this sensor is simple, it only includes splicing and
cleaving the PCF with SMF.PCF (LMA-10) with a certain length
spliced to SMF (Corning-28).
The spectrum of PCFI exhibits good sensitivity to humidity
variations. The PCFI response is observed for a range of humidity
values from (27% RH to 85% RH), the position of the interference
peaks is found to be shifted to longer wavelength with humidity
increasing. In this work, a different length of PCFs are used, and the
maximum humidity sensitivity of (5.86 pm / %RH) is achieved with
(4.5cm) PCF length, and the rise time of (8sec) is achieved. This
humidity sensor has distinguished features as that it does not require
the use of a hygroscopic material, robust, compact size, immunity to
electromagnetic interference, and it has potential applications for
high humidity environments.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Delivery Route Management based on Dijkstra Algorithm
...Show More Authors

For businesses that provide delivery services, the efficiency of the delivery process in terms of punctuality is very important. In addition to increasing customer trust, efficient route management, and selection are required to reduce vehicle fuel costs and expedite delivery. Some small and medium businesses still use conventional methods to manage delivery routes. Decisions to manage delivery schedules and routes do not use any specific methods to expedite the delivery settlement process. This process is inefficient, takes a long time, increases costs and is prone to errors. Therefore, the Dijkstra algorithm has been used to improve the delivery management process. A delivery management system was developed to help managers and drivers

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Thu Feb 28 2019
Journal Name
Multimedia Tools And Applications
Shot boundary detection based on orthogonal polynomial
...Show More Authors

View Publication
Scopus (41)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Sun Dec 28 2025
Journal Name
Iraqi Journal Of Science
Intrusion Detection Approach Based on DNA Signature
...Show More Authors

View Publication
Publication Date
Fri Aug 23 2024
Journal Name
Aro-the Scientific Journal Of Koya University
Graphical User Authentication Algorithms Based on Recognition
...Show More Authors

In cyber security, the most crucial subject in information security is user authentication. Robust text-based password methods may offer a certain level of protection. Strong passwords are hard to remember, though, so people who use them frequently write them on paper or store them in file for computer .Numerous of computer systems, networks, and Internet-based environments have experimented with using graphical authentication techniques for user authentication in recent years. The two main characteristics of all graphical passwords are their security and usability. Regretfully, none of these methods could adequately address both of these factors concurrently. The ISO usability standards and associated characteristics for graphical

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys
...Show More Authors

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (23)
Scopus Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Skull Stripping Based on the Segmentation Models
...Show More Authors

Skull image separation is one of the initial procedures used to detect brain abnormalities. In an MRI image of the brain, this process involves distinguishing the tissue that makes up the brain from the tissue that does not make up the brain. Even for experienced radiologists, separating the brain from the skull is a difficult task, and the accuracy of the results can vary quite a little from one individual to the next. Therefore, skull stripping in brain magnetic resonance volume has become increasingly popular due to the requirement for a dependable, accurate, and thorough method for processing brain datasets. Furthermore, skull stripping must be performed accurately for neuroimaging diagnostic systems since neither no

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Dec 28 2025
Journal Name
Journal Of Baghdad College Of Dentistry
The effect of the addition of silanated poly propylene fiber to polymethylmethacrylate denture base material on some of its mechanical properties
...Show More Authors

Background: Poly propylene fibers with and without silane treatment have been used to reinforce heat cure denture base acrylic but, some mechanical properties like transverse strength, impact strength, tensile strength, hardness, wear resistance and wettability. Which are related to the clinical use of the prosthesis are not evaluated yet. The aim of the study is to identify the influence of incorporation of treated and untreated fibers on these properties Materials and methods: Eighty four heat cure acrylic specimens were constructed by conventional flasking technique. They were divided into six groups according to the tests and each group was subdivided into two subgroups control and experimental groups (seven samples for each subgroup

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 17 2025
Journal Name
African Journal Of Biomedical Research
Digital Evaluation of Cuspal Deflection of Endodontically Treated Teeth Restored with Resin Composite and Different Fiber Formulations
...Show More Authors

Background: This study evaluated the influence of different fiber formulations incorporation in resin composite on cuspal deflection (CD) of endodontically-treated teeth with mesio-occluso-distal (MOD) cavities. Materials and Methods: Thirty-two freshly extracted maxillary premolar teeth received MOD cavity preparation followed by endodontic treatment using single cone obturation technique, and divided into: Group I: direct composite resin only using a centripetal technique, Group II: direct composite resin with short fiber-reinforced composite (everX Flow), Group III: direct composite resin with leno wave ultra-high molecular weight polyethylene (LWUHMWPE) fibers placed on the cavity floor, and Group IV: direct composite resin with LWUHMWP

... Show More
Preview PDF
Publication Date
Thu Apr 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of e-governance on achieving creative performance
...Show More Authors

The research aims to investigate the relationship and impact of e-governance as an independent variable in achieving creative performance as a dependent variable. These variables have been studied in the Directorate of Passports Affairs, and seek to come up with a set of recommendations that help in promoting e-governance in the researched organization, and the researcher adopted the descriptive-analytical approach, included The sample (122) of the total (194) individuals distributed in several administrative levels (officers, associates, and administrative staff). By adopting the questionnaire, which included (49) paragraphs as the main tool for the collection of data and information, as well as personal interviews and field obs

... Show More
View Publication Preview PDF
Crossref (1)
Crossref