Preferred Language
Articles
/
ijs-2001
Experimental Investigation for Some Properties of PMMA Denture Base Strengthened by Different Nanoadditives
...Show More Authors

In dental and medical applications, poly-methyl methacrylate (PMMA) has been widely accepted due to the excellent biocompatibility and easy fabrication. Yet, some of the physical and mechanical characteristics of this compound are considered inferior. Seven groups of PMMA nano-composite samples were reported to be fabricated at laboratory temperature . These samples could be used in manufacturing the complete or partial maxillary denture base. The aim of this research is to prepare nano-composite materials which consist of PMMA as a matrix material and two different types of powder (prepared nanoparticles of SnO2 and natural egg shell powder (ESP)) as strengthening materials. The selected additives were used in many cases as pure or hybrid composites, specifically with weight percentage ratios of 1 and 2 wt%. Several analytical tests, namely AFM, FTIR, XRD and SEM, were used on the prepared nanoparticles. In addition, several tests were applied to assess the mechanical behavior before and after the reinforcement, including thermal conductivity, Vickers micro-Hardness, and water absorption. The results showed that the maximum amount of energy absorption in the composites was 1% at different types of additives, while a significant increase in thermal conductivity was recorded as the SnO2NPs percentage was increased. For surface micro-hardness, an obvious trend of increase was observed with the increase in additive percentage. The highest measured values of micro-hardness (19.59VHS and 13.30VHS) were recorded for the pure composites of 2% ESP and 2% SnO2, respectively. The results of water absorption test showed that higher percentages of ESP and SnO2, separately, within the pure composite resulted in higher water absorption capacity and an increased  value of diffusion coefficient (D).

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 28 2018
Journal Name
International Journal Of Engineering & Technology
Modified Strut Effectiveness Factor for FRP-Reinforced Concrete Deep Beams
...Show More Authors

A few examinations have endeavored to assess a definitive shear quality of a fiber fortified polymer (FRP)- strengthened solid shallow shafts. Be that as it may, need data announced for examining the solid profound pillars strengthened with FRP bars. The majority of these investigations don't think about the blend of the rigidity of both FRP support and cement. This examination builds up a basic swagger adequacy factor model to evaluate the referenced issue. Two sorts of disappointment modes; concrete part and pulverizing disappointment modes were examined. Protection from corner to corner part is chiefly given by the longitudinal FRP support, steel shear fortification, and cement rigidity. The proposed model has been confirmed util

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
An optimized deep learning model for optical character recognition applications
...Show More Authors

The convolutional neural networks (CNN) are among the most utilized neural networks in various applications, including deep learning. In recent years, the continuing extension of CNN into increasingly complicated domains has made its training process more difficult. Thus, researchers adopted optimized hybrid algorithms to address this problem. In this work, a novel chaotic black hole algorithm-based approach was created for the training of CNN to optimize its performance via avoidance of entrapment in the local minima. The logistic chaotic map was used to initialize the population instead of using the uniform distribution. The proposed training algorithm was developed based on a specific benchmark problem for optical character recog

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Estimation for Carbonate Reservoir (Case Study/ South Iraqi Field)
...Show More Authors

 

   The heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units.

Evaluation of reservoir characterization  was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) an

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sun Sep 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Estimation for Carbonate Reservoir (Case Study/ South Iraqi Field)
...Show More Authors

     The heterogeneity nature of carbonate reservoirs shows sever scattering of the data, therefore, one has to be cautious in using the permeability- porosity correlation for calculating permeability unless a good correlation coefficient is available. In addition, a permeability- porosity correlation technique is not enough by itself since simulation studies also require more accurate tools for reservoir description and diagnosis of flow and non-flow units. Evaluation of reservoir characterization  was conducted by this paper for Mishrif Formation in south Iraqi oil field (heterogeneous carbonate reservoir), namely the permeability-porosity correlation, the hydraulic units (HU’s) and global hydraulic elements (GHE

... Show More
Crossref (3)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
International Journal Of Agricultural And Statistical Sciences
ESTIMATED NON-PARAMETRIC AND SEMI-PARAMETRIC MODEL FOR LONGITUDINAL DATA
...Show More Authors

View Publication
Scopus
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Hybrid Deep Learning Enabled Load Prediction for Energy Storage Systems
...Show More Authors

View Publication
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sat Jul 09 2022
Journal Name
Wireless Communications And Mobile Computing
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial t

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Thu Mar 30 2023
Journal Name
Iraqi Journal Of Science
Wallet Key Generation for a Generic Blockchain based on Speech
...Show More Authors

      As a new technology, blockchain provides the necessary capabilities to assure data integrity and data security through encryption. Mostly, all existing algorithms that provide security rely on the process of discovering a suitable key. Hence, key generation is considered the core of powerful encryption. This paper uses Zernike moment and Mersenne prime numbers to generate strong prime numbers by extracting the features from biometrics (speech). This proposed system sends these unique and strong prime numbers to the RSA algorithm to generate the keys. These keys represent a public address and a private key in a cryptocurrency wallet that is used to encrypt transactions. The benefit of this work is that it provides a high degree

... Show More
View Publication Preview PDF
Scopus Crossref