Preferred Language
Articles
/
ijp-682
Enhancement of Photoconductive Detector Based on Carbon Nanotubes Decorated with Silver Nanoparticles by Adding Conductive Polymer
...Show More Authors

In this work, wide band range photo detector operating in UV, Visible and IR was fabricated using carbon nanotubes (MWCNTs, SWCNTs) decorated with silver nanoparticles (Ag NPs). Silicon was used as a substrate to deposited CNTs/Ag NPs by the drop casting technique. Polyamide nylon polymer was used to coat CNTs/Ag NPs to enhance the photo-response of the detector. The electro-exploding wire technology was used to synthesize Ag NPs. Good dispersion of silver NPs achieved by a simple chemistry process on the surface of CNTs. The optical, structure and electrical characteristic of CNTs decorated with Ag NPs were characterized by X-Ray diffraction and Field Emission Scanning Electron Microscopy.  X-ray diffraction patterns of Ag NPs exhibited 2θ values (38.1°,44.3°) corresponding to the Ag nanocrystal, while the XRD pattern of MWCNTs and SWCNTs /Ag NPs peaks appeared at 2θ = 26.2° corresponding to the (002) and at 2theta=44° which corresponds with miller indices (100) for CNTs and (200) for Ag NPs. The optical properties measured by UV-Vis. Spectroscopy. Broad and strong surface plasmon resonance (SPR) peak was detected at 420 nm, for Ag NPs. The absorption of CNTs/Ag NPs increased significantly from UV to near IR region (300-1000 nm).  Ag NPs decorated CNTs without any impurities, according to field mission scanning electron microscopy examination, with typical particle sizes of (50-80nm) for Ag-NPs, 44nm for MWCNTs/Ag-NPs, and 30nm for SWCNTs/Ag NPs. ֹThe I-V characteristics at forward bias voltage (0.5-10) volt were studied. The figure of merits (responsivity, photocurrent gain, NEP and detectivity) after coating with polymer of the detector were measured in the dark and after illumination with UV LED (365 nm), Tungsten lamp (500-800 nm) and Laser diode (808 nm).

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 31 2021
Journal Name
Iraqi Journal Of Science
Single-based and Population-based Metaheuristics for Solving NP-hard Problems
...Show More Authors

Metaheuristic is one of the most well-known fields of research used to find optimum solutions for non-deterministic polynomial hard (NP-hard) problems, for which it is difficult to find an optimal solution in a polynomial time. This paper introduces the metaheuristic-based algorithms and their classifications and non-deterministic polynomial hard problems. It also compares the performance of two metaheuristic-based algorithms (Elephant Herding Optimization algorithm and Tabu Search) to solve the Traveling Salesman Problem (TSP), which is one of the most known non-deterministic polynomial hard problems and widely used in the performance evaluations for different metaheuristics-based optimization algorithms. The experimental results of Ele

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Thu Dec 01 2011
Journal Name
International Review Of Physics (e-journal) (irephy)
Red shift band enhancement of the nanostructure ZnO100-xAlx thin films as a function of Al concentration for optoelectronic applications
...Show More Authors

Preview PDF
Publication Date
Tue May 01 2018
Journal Name
Journal Of Engineering
Performance enhancement of Echo Cancellation Using a Combination of Partial Update ( PU) Methods and New Variable Length LMS (NVLLMS) Algorithm
...Show More Authors

In this paper, several combination algorithms between Partial Update LMS (PU LMS) methods and previously proposed algorithm (New Variable Length LMS (NVLLMS)) have been developed. Then, the new sets of proposed algorithms were applied to an Acoustic Echo Cancellation system (AEC) in order to decrease the filter coefficients, decrease the convergence time, and enhance its performance in terms of Mean Square Error (MSE) and Echo Return Loss Enhancement (ERLE). These proposed algorithms will use the Echo Return Loss Enhancement (ERLE) to control the operation of filter's coefficient length variation. In addition, the time-varying step size is used.The total number of coefficients required was reduced by about 18% , 10% , 6%

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 05 2023
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Partial Face Encryption in Real World Experiences Based on Features Extraction from Edge Detection
...Show More Authors

User confidentiality protection is concerning a topic in control and monitoring spaces. In image, user's faces security in concerning with compound information, abused situations, participation on global transmission media and real-world experiences are extremely significant. For minifying the counting needs for vast size of image info and for minifying the size of time needful for the image to be address computationally. consequently, partial encryption user-face is picked. This study focuses on a large technique that is designed to encrypt the user's face slightly. Primarily, dlib is utilizing for user-face detection. Susan is one of the top edge detectors with valuable localization characteristics marked edges, is used to extract

... Show More
View Publication
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Sat Mar 01 2008
Journal Name
Al-khwarizmi Engineering Journal
Minimizing error in robot arm based on design optimization for high stiffness to weight ratio
...Show More Authors

In this work the effect of choosing tri-circular tube section had been addressed to minimize the end effector’s error, a comparison had been made between the tri-tube section and the traditional square cross section for a robot arm, the study shows that for the same weight of square section and tri-tube section the error may be reduced by about 33%.

A program had been built up by the use of MathCAD software to calculate the minimum weight of a square section robot arm that could with stand a given pay load and gives a minimum deflection. The second part of the program makes an optimization process for the dimension of the cross section and gives the dimensions of the tri-circular tube cross section that have the same weight of

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Cascade position-torque control strategy based on function approximation technique (FAT) for flexible joint robots
...Show More Authors

View Publication
Crossref (1)
Crossref
Publication Date
Sun Jan 01 2017
Journal Name
International Journal Of Advanced Computer Science And Applications
Fast Hybrid String Matching Algorithm based on the Quick-Skip and Tuned Boyer-Moore Algorithms
...Show More Authors

View Publication
Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
A Hybrid Algorithms Based on the Aizawa Attractor and Rabbit-Lightweight Cipher for Image Encryption
...Show More Authors

     Social media and networks rely heavily on images. Those images should be distributed in a private manner. Image encryption is therefore one of the most crucial components of cyber security. In the present study, an effective image encryption technique is developed that combines the Rabbit Algorithm, a simple algorithm, with the Attractor of Aizawa, a chaotic map. The lightweight encryption algorithm (Rabbit Algorithm), which is a 3D dynamic system, is made more secure by the Attractor of Aizawa. The process separates color images into blocks by first dividing them into bands of red, green, and blue (RGB). The presented approach generates multiple keys, or sequences, based on the initial parameters and conditions, which are

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iraqi Journal Of Physics
D-Shaped Photonic Crystal Fiber Toxic Metal Ions (Arsenic) Sensor Based on Surface Plasmon Resonance
...Show More Authors

In this work, a Photonic Crystal Fiber (PCF) sensor based on the Surface Plasmon Resonance (SPR) technology was proposed. A thin layer of gold (Au) was deposited on a D-shaped Photonic Crystal Fiber (PCF), which was coated with plasmonic chemically stable gold material with a thickness of 40nm. The performance parameters like sensitivity including wavelength sensitivity and amplitude sensitivity and resolution were evaluated by simulation using COMSOL software. The proposed sensor was created by using the finite element approach, it is numerically examined. The results show that the surface of D-shaped Photonic Crystal Fiber coated with Au behaves as a sensor to detect the refractive index (IR) of toxic metal ions. The impacts of the str

... Show More
View Publication Preview PDF
Crossref (4)
Crossref