Preferred Language
Articles
/
ijs-3340
Capacitance and Resistivity Measurements of Polythiophene /Metallic Nanoparticles-based Humidity Sensors
...Show More Authors

Capacitive–resistive humidity sensors based on polythiophene (P3HT) organic semiconductor as an active material hybrid with three types of metallic nanoparticles (NP) (Ag, Al, and Cu) were synthesized by pulsed laser ablation (PLA). The hybrid P3HT/metallic nanoparticles were deposited on indium-tin-oxide (ITO) substrate at room temperature. The surface morphology of theses samples was studied by using field emission scanning electron micrographs (FE-SEM), which indicated the formation of nanoparticles with grain size of about 50nm. The electrical characteristics of the sensors were examined as a function of the relative humidity levels. The sensors showed an increase in the capacitance with variation in the humidity level.  While the resistivity While the resistivity decrease nonlinearity in the variation of humidity level from 10% to 100%.. The results show that the recovery and response times were higher for the Al/P3HT/Cu/Al sensor compared with those of the other nanoparticles.   

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 01 2008
Journal Name
Digital Signal Processing
A high performance parallel Radon based OFDM transceiver design and simulation
...Show More Authors

major goal of the next-generation wireless communication systems is the development of a reliable high-speed wireless communication system that supports high user mobility. They must focus on increasing the link throughput and the network capacity. In this paper a novel, spectral efficient system is proposed for generating and transmitting twodimensional (2-D) orthogonal frequency division multiplexing (OFDM) symbols through 2- D inter-symbol interference (ISI) channel. Instead of conventional data mapping techniques, discrete finite Radon transform (FRAT) is used as a data mapping technique due to the increased orthogonality offered. As a result, the proposed structure gives a significant improvement in bit error rate (BER) performance. Th

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Science
Novel Dynamic S-Box Based on Password Key and Circle Map
...Show More Authors

     Many cryptosystems and security techniques use substitution boxes to ensure the data’s secure communication. A new technique is presented for generating a robust S-box to fulfill security requirements. The AES algorithm represents a block cipher cryptographic algorithm. It was selected by the National Institute of Science and Technology as the optimal cryptographic algorithm in 2011. Through the study of the properties of original S-BOX, this algorithm has been subjected to a number of attacks (linear, differential, statistical, and interpolation), and original S-BOX has been static, which makes the attack strong and shows a weakness in the algorithm.  It is necessary to make this algorithm more efficient and powerful through

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Ieee Systems Journal
Intelligent Traffic Management and Load Balance Based on Spike ISDN-IoT
...Show More Authors

An intelligent software defined network (ISDN) based on an intelligent controller can manage and control the network in a remarkable way. In this article, a methodology is proposed to estimate the packet flow at the sensing plane in the software defined network-Internet of Things based on a partial recurrent spike neural network (PRSNN) congestion controller, to predict the next step ahead of packet flow and thus, reduce the congestion that may occur. That is, the proposed model (spike ISDN-IoT) is enhanced with a congestion controller. This controller works as a proactive controller in the proposed model. In addition, we propose another intelligent clustering controller based on an artificial neural network, which operates as a reactive co

... Show More
Scopus (17)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Ieee Access
Speech Enhancement Algorithm Based on Super-Gaussian Modeling and Orthogonal Polynomials
...Show More Authors

View Publication
Scopus (40)
Crossref (39)
Scopus Clarivate Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Design and Implementation ofICT-Based Recycle-Rewarding System for Green Environment
...Show More Authors

This paper proposes a collaborative system called Recycle Rewarding System (RRS), and focuses on the aspect of using information communication technology (ICT) as a tool to promote greening. The idea behind RRS is to encourage recycling collectors by paying them for earning points. In doing so, both the industries and individuals reap the economical benefits of such system. Finally, and more importantly, the system intends to achieve a green environment for the Earth. This paper discusses the design and implementation of the RRS, involves: the architectural design, selection of components, and implementation issues. Five modules are used to construct the system, namely: database, data entry, points collecting and recording, points reward

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Digital Speech Files Encryption based on Hénon and Gingerbread Chaotic Maps
...Show More Authors

Speech encryption approaches are used to prevent eavesdropping, tracking, and other security concerns in speech communication. In this paper, a new cryptography algorithm is proposed to encrypt digital speech files. Initially, the digital speech files are rearranged as a cubic model with six sides to scatter speech data. Furthermore, each side is encrypted by random keys that are created by using two chaotic maps (Hénon and Gingerbread chaotic maps). Encryption for each side of the cube is achieved, using the based map vector that is generated randomly by using a simple random function. Map vector that consists of six bits, each bit refers to one of the specific chaotic maps that generate a random key to encrypt each face of the cube. R

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (6)
Scopus Crossref
Publication Date
Fri Apr 28 2023
Journal Name
Surgical Neurology International
Neurosurgery theater-based learning: Etiquette and preparation tips for medical students
...Show More Authors

View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
An Accurate Handwritten Digits Recognition system Based on DWT and FCT
...Show More Authors

In this paper an accurate Indian handwritten digits recognition system is
proposed. The system used three proposed method for extracting the most effecting
features to represent the characteristic of each digit. Discrete Wavelet Transform
(DWT) at level one and Fast Cosine Transform (FCT) is used for features extraction
from the thinned image. Besides that, the system used a standard database which is
ADBase database for evaluation. The extracted features were classified with KNearest
Neighbor (KNN) classifier based on cityblock distance function and the
experimental results show that the proposed system achieved 98.2% recognition
rate.

View Publication Preview PDF
Crossref
Publication Date
Thu Mar 03 2022
Journal Name
Arabian Journal For Science And Engineering
Experimental Study of Cuttings Transport Efficiency of Low Solid Bentonite Drilling Fluids Modified by Cellulose Nanoparticles
...Show More Authors

Advancements in horizontal drilling technologies are utilized to develop unconventional resources, where reservoir temperatures and pressures are very high. However, the flocculation of bentonite in traditional fluids at high temperature and high pressure (HTHP) environments can lower cuttings transportation efficiency and even result in problems such as stuck pipe, decreased rate of penetration (ROP), accelerated bit wear, high torque, and drag on the drill string, and formation damage. The major purpose of the present research is to investigate the performance of low bentonite content water-based fluids for the hole cleaning operation in horizontal drilling processes. Low bentonite content water-based drilling fluids were formulated by re

... Show More
Crossref (4)
Crossref