Preferred Language
Articles
/
ijp-692
Optical, Structural, Morphological Properties of Chromium (III) Oxide Nanostructure Synthesized Using Spray Pyrolysis Technique
...Show More Authors

Nanostructure of chromium oxide (Cr2O3-NPs) with rhombohedral structure were successfully prepared by spray pyrolysis technique using Aqueous solution of Chromium (III) chloride CrCl3 as solution. The films were deposited on glass substrates heated to 450°C using X-ray diffraction (XRD) shows the nature of polycrystalline samples. The calculated lattice constant value for the grown Cr2O3 nanostructures is a = b = 4.959 Å & c = 13.594 Å and the average crystallize size (46.3-55.6) nm calculated from diffraction peaks, Spectral analysis revealed FTIR peak characteristic vibrations of Cr-O Extended and Two sharp peaks present at 630 and 578 cm-1 attributed to Cr-O “stretching modes”, are clear evidence of the presence of crystalline Cr2O3. The energy band gap (3.4 eV) for the chromium oxide nanostructures was measured using the UV-VIS-NIR Optical Spectrophotometer. It was found that by scanning electron microscopy (SEM) and image results, there is a large amount of nanostructure with an average crystal size of 46.3-55.6 nm, which indicates that our synthesis process is a successful method for preparing Cr2O3 nanoparticles.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
Eatimation Availability Function Through Determination The Optimal Imperfect Preventive Maintenance Period By using Simulation
...Show More Authors

This paper deals with the modeling of a preventive maintenance strategy applied to a single-unit system subject to random failures.

According to this policy, the system is subjected to imperfect periodic preventive maintenance restoring it to ‘as good as new’ with probability

p and leaving it at state ‘as bad as old’ with probability q. Imperfect repairs are performed following failures occurring between consecutive

preventive maintenance actions, i.e the times between failures follow a decreasing quasi-renewal process with parameter a. Considering the

average durations of the preventive and corrective maintenance actions a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Physics: Conference Series
Study electron transport coefficients for Ar, O2 and their mixtures by using EEDF program
...Show More Authors

Publication Date
Thu Jun 27 2024
Journal Name
Journal Of Image And Graphics
ALL-FABNET: Acute Lymphocytic Leukemia Segmentation Using a Flipping Attention Block Decoder-Encoder Network
...Show More Authors

Melanoma, a highly malignant form of skin cancer, affects individuals of all genders and is associated with high mortality rates, especially in advanced stages. The use of tele-dermatology has emerged as a proficient diagnostic approach for skin lesions and is particularly beneficial in rural areas with limited access to dermatologists. However, accurately, and efficiently segmenting melanoma remains a challenging task due to the significant diversity observed in the morphology, pigmentation, and dimensions of cutaneous nevi. To address this challenge, we propose a novel approach called DenseUNet-169 with a dilated convolution encoder-decoder for automatic segmentation of RGB dermascopic images. By incorporating dilated convolution,

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Sat Dec 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Using Three-Dimensional Logistic Equations and Glowworm Swarm Optimization Algorithm to Generate S-Box
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Physics
Lineament automatic extraction analysis for Galal Badra river basin using Landsat 8 satellite image
...Show More Authors

This research including lineament automated extraction by using PCI Geomatica program, depending on satellite image and lineament analysis by using GIS program. Analysis included density analysis, length density analysis and intersection density analysis. When calculate the slope map for the study area, found the relationship between the slope and lineament density.
The lineament density increases in the regions that have high values for the slope, show that lineament play an important role in the classification process as it isolates the class for the other were observed in Iranian territory, clearly, also show that one of the lineament hit shoulders of Galal Badra dam and the surrounding areas dam. So should take into consideration

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Advances In Mechanical Engineering
Using a spherical inverted pendulum and statokinesigram for modeling and evaluating quiet standing posture
...Show More Authors

This paper proposes a new approach to model and analyze erect posture, based on a spherical inverted pendulum which is used to mimic the body posture. The pendulum oscillates in two directions, [Formula: see text] and [Formula: see text], from which the mathematical model was derived and two torque components in oscillation directions were introduced. They are estimated using stabilometric data acquired by a foot pressure mapping system. The model was quantitatively investigated using data from 19 participants, who were first were classified into three groups, according to the foot arch-index. Stabilometric data were then collected and fed into the model to estimate the torque’s components. The components were statistically proce

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Nov 01 2021
Journal Name
Energies
Solidification Enhancement in a Triple-Tube Latent Heat Energy Storage System Using Twisted Fins
...Show More Authors

This work evaluates the influence of combining twisted fins in a triple-tube heat exchanger utilised for latent heat thermal energy storage (LHTES) in three-dimensional numerical simulation and comparing the outcome with the cases of the straight fins and no fins. The phase change material (PCM) is in the annulus between the inner and the outer tube, these tubes include a cold fluid that flows in the counter current path, to solidify the PCM and release the heat storage energy. The performance of the unit was assessed based on the liquid fraction and temperature profiles as well as solidification and the energy storage rate. This study aims to find suitable and efficient fins number and the optimum values of the Re and the inlet tem

... Show More
View Publication
Scopus (41)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Environmental Technology & Innovation
Cadmium removal using a spiral-wound woven wire meshes packed bed rotating cylinder electrode
...Show More Authors

The effect of electrolysis operating parameters on the removal efficiency of cadmium from a simulated wastewater was studied by adopting response surface methodology combined with Box–Behnken Design. As a new electrode design, spiral-wound woven wire mesh rotating cylinder electrode was used for cadmium removal. Current (240–400 mA), rotation speed (200–1000 rpm), initial cadmium concentration (200–600ppm), and cathode mesh number (30–60) were chosen as independent variables while the removal efficiency of cadmium was considered as a response function. The results revealed that the rotation speed has the major effect on the removal efficiency of cadmium. Regression analysis showed good fit of the experimental data to the second-or

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (22)
Scopus Clarivate Crossref