Preferred Language
Articles
/
ijp-448
Characterization of Zinc oxide Nanostructures prepared by hydrothermal method with Antibacterial property
...Show More Authors

        In this study, Zinc oxide nanostructures were synthesized via a hydrothermal method by using zinc nitrate hexahydrate and sodium hydroxide as a precursor. Three different annealing temperatures were used to study their effect on ZnO NSs properties. The synthesized nanostructure was characterized by X-ray diffraction (XRD), field emission scanning electron microscopy (FESEM), Atomic force microscope (AFM), and Fourier Transform Infrared Spectroscopy (FTIR). Their optical properties were studied by using UV -visible spectroscopy. The XRD analysis confirms that all ZnO nanostructures have the hexagonal wurtzite structure with average crystallite size within the range of (30.59 - 34.52) nm. The crystallite size increased due to the incensement of annealing temperature. FESEM analysis indicates that ZnO has hexagonal shape of cylindrical pores, plate-like nanocrystals and Nanorods. AFM analysis shows that the average surface roughness of ZnO Nanostructures increases from 3.96 to 19.1 nm with the increase of annealing temperature. The FTIR peaks indicate successful preparation of ZnO Nanostructures. The FTIR method was used to analyses the chemical bonds which conformed the present of the Zn-O group in the region between (400-500) cm-1. The UV-visible showed a red shift in the absorption spectra related to the shift in the energy gap related to increase in the particle size.  the band gap energy has been calculated from the optical absorption spectra. The annealing process has been fond more effective on the value of energy gap. As the annealing temperature increases, the value of energy gap, increases as well; from (3.12to 3.22) eV. The prepared Nanostructure is used for antibacterial property. It shows strong antibacterial activity against S. aureus and P.aeuruginosa bacteria by the agar disc diffusion method. The white precipitate of ZnO NSs has superior antibacterial activity on gram-positive (S. aureus) than the gram-negative (P.aeuruginosa) bacteria.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (45)
Crossref (35)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Advanced Computer Science And Applications
Achieving Flatness: Honeywords Generation Method for Passwords based on user behaviours
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 24 2017
Journal Name
Journal Of Engineering
A new analytic method to tune a fractional order PID controller
...Show More Authors

This paper proposes a new method to tune a fractional order PID controller. This method utilizes both the analytic and numeric approach to determine the controller parameters. The control design specifications that must be achieved by the control system are gain crossover frequency, phase margin, and peak magnitude at the resonant frequency, where the latter is a new design specification suggested by this paper. These specifications results in three equations in five unknown variables. Assuming that certain relations exist between two variables and discretizing one of them, a performance index can be evaluated and the optimal controller parameters that minimize this performance index are selected. As a case study, a third order linear time

... Show More
Publication Date
Mon Mar 01 2010
Journal Name
Journal Of Economics And Administrative Sciences
Planning the main production tables using the correct binary programming method
...Show More Authors

This research include building mathematical models for aggregating planning and shorting planning by using integer programming technique for planning master production scheduling in order to control on the operating production for manufacturing companies to achieve their objectives of increasing the efficiency of utilizing resources and reduce storage and  improving customers service  through  deliver in the actual dates and reducing delays.

View Publication Preview PDF
Crossref
Publication Date
Wed Apr 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving Nonlinear COVID-19 Mathematical Model Using a Reliable Numerical Method
...Show More Authors

This research aims to numerically solve a nonlinear initial value problem presented as a system of ordinary differential equations. Our focus is on epidemiological systems in particular. The accurate numerical method that is the Runge-Kutta method of order four has been used to solve this problem that is represented in the epidemic model. The COVID-19 mathematical epidemic model in Iraq from 2020 to the next years is the application under study. Finally, the results obtained for the COVID-19 model have been discussed tabular and graphically. The spread of the COVID-19 pandemic can be observed via the behavior of the different stages of the model that approximates the behavior of actual the COVID-19 epidemic in Iraq. In our study, the COV

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 04 2018
Journal Name
Journal Of Electrical Engineering And Technology
An efficient selective method for audio watermarking against de-synchronization attacks
...Show More Authors

View Publication
Scopus (6)
Scopus
Publication Date
Sun May 01 2016
Journal Name
2016 Al-sadeq International Conference On Multidisciplinary In It And Communication Science And Applications (aic-mitcsa)
Landsat-8 (OLI) classification method based on tasseled cap transformation features
...Show More Authors

View Publication
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
A Proposed Analytical Method for Solving Fuzzy Linear Initial Value Problems
...Show More Authors

     In this article, we aim to define a universal set consisting of the subscripts of the fuzzy differential equation (5) except the two elements  and , subsets of that universal set are defined according to certain conditions. Then, we use the constructed universal set with its subsets for suggesting an analytical method which facilitates solving fuzzy initial value problems of any order by using the strongly generalized H-differentiability. Also, valid sets with graphs for solutions of fuzzy initial value problems of higher orders are found.

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Computers & Electrical Engineering
A new proposed statistical feature extraction method in speech emotion recognition
...Show More Authors

View Publication
Scopus (30)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Chaos-based Color Image Steganography Method Using 3 D Cat Map
...Show More Authors

     Steganography is a technique to hide a secret message within a different multimedia carrier so that the secret message cannot be identified. The goals of steganography techniques include improvements in imperceptibility, information hiding, capacity, security, and robustness. In spite of numerous secure methodologies that have been introduced, there are ongoing attempts to develop these techniques to make them more secure and robust. This paper introduces a color image steganographic method based on a secret map, namely 3-D cat. The proposed method aims to embed data using a secure structure of chaotic steganography, ensuring better security. Rather than using the complete image for data hiding, the selection of

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref