Preferred Language
Articles
/
ijs-3340
Capacitance and Resistivity Measurements of Polythiophene /Metallic Nanoparticles-based Humidity Sensors
...Show More Authors

Capacitive–resistive humidity sensors based on polythiophene (P3HT) organic semiconductor as an active material hybrid with three types of metallic nanoparticles (NP) (Ag, Al, and Cu) were synthesized by pulsed laser ablation (PLA). The hybrid P3HT/metallic nanoparticles were deposited on indium-tin-oxide (ITO) substrate at room temperature. The surface morphology of theses samples was studied by using field emission scanning electron micrographs (FE-SEM), which indicated the formation of nanoparticles with grain size of about 50nm. The electrical characteristics of the sensors were examined as a function of the relative humidity levels. The sensors showed an increase in the capacitance with variation in the humidity level.  While the resistivity While the resistivity decrease nonlinearity in the variation of humidity level from 10% to 100%.. The results show that the recovery and response times were higher for the Al/P3HT/Cu/Al sensor compared with those of the other nanoparticles.   

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Jun 26 2019
Journal Name
Iraqi Journal Of Science
Well-Controlled Generation Process of Bimetallic Ag//Au Colloidal Nanoparticles by Non-Thermal Plasma DC Glow Discharge
...Show More Authors

In this paper, an inexpensive, simple and well-accurate process of the generation of bimetallic silver Ag//gold Au core//shell is colloidal metal nanoparticles (MNPs). This is achieved via an atmospheric pressure non-thermal plasma glow discharge between two electrodes. One of these electrodes is a capillary tube placing over solution about (1 cm) that acts as the cathode, while the other electrode is a metal disk immersed in the solution and acts as an anode. Glow discharge process carried out at room temperature using a home-made cell with (6 KV) applied voltage and direct current (DC) about (1.8 mA) for different discharge periods. A wide range of bimetallic Ag//Au colloidal MNPs was rapidly synthesized as a result of non-thermal plas

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Mar 15 2018
Journal Name
Moroccan Journal Of Chemistry
Corrosion Protection of Carbon Steel in seawater by alumina nanoparticles with poly (acrylic acid) as charging agent
...Show More Authors

Nanostructured Al2O3has been applied as a protective coating against corrosion of the carbon steel (C.S) in seawater environment (3.5% NaCl) at temperatures range (298-328)K. Aluminananoparticles were deposited on carbon steel substrates by cathodic electrophoretic deposition (EPD) with ethanol as suspension medium and poly(acrylic acid) (PAA) as polymeric charging agent. Meanwhile, thesurface morphology was examined using Atomic-force microscopy (AFM). The cross-section AFM showed that the particles sizes for the Al2O3 NPs is around 60-80 nm. The anticorrosion behaviour of coated C.S was investigated in 3.5% NaCl at temperature range 298-328 K by potentiodynamic polarization measurements. Results show that using PAA in suspension coat incr

... Show More
View Publication Preview PDF
Scopus (12)
Scopus
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
ECC Based Encryption for the Secured Proactive Network Forensic Framework
...Show More Authors

     Elliptic Curve Cryptography (ECC) is one of the public key cryptosystems that works based on the algebraic models in the form of elliptic curves. Usually, in ECC to implement the encryption, the encoding of data must be carried out on the elliptic curve, which seems to be a preprocessing step. Similarly, after the decryption a post processing step must be conducted for mapping or decoding the corresponding data to the exact point on the elliptic curves. The Memory Mapping (MM) and Koblitz Encoding (KE) are the commonly used encoding models. But both encoding models have drawbacks as the MM needs more memory for processing and the KE needs more computational resources. To overcome these issues the proposed enhanced Koblitz encodi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
NS2 – Based Experimental Analysis of Throughput for TCP and UDP Traffic During Link Failure of The Network
...Show More Authors

     Link failure refers to the failure between two connections/nodes in a perfectly working simulation scenario at a particular instance. Transport layer routing protocols form an important basis of setting up a simulation, with Transmission Control Protocol and User Datagram Protocol being the primary of them. The research makes use of Network Simulator v2.35 to conduct different simulation experiments for link failure and provide validation results. In this paper, both protocols, TCP and UDP are compared based on the throughput of packets delivered from one node to the other constrained to the condition that for a certain interval of time the link fails and the simulation time remains the same for either of the protocols. Overall,

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Apr 28 2022
Journal Name
Iraqi Journal Of Science
Design of an Efficient Face Recognition Algorithm based on Hybrid Method of Eigen Faces and Gabor Filter
...Show More Authors

Face recognition is one of the most applications interesting in computer vision and pattern recognition fields. This is for many reasons; the most important of them are the availability and easy access by sensors. Face recognition system can be a sub-system of many applications. In this paper, an efficient face recognition algorithm is proposed based on the accuracy of Gabor filter for feature extraction and computing the Eigen faces. In this work, efficient compressed feature vector approach is proposed. This compression for feature vector gives a good recognition rate reaches to 100% and reduced the complexity of computing Eigen faces. Faces94 data base was used to test method.

View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Optimization of Inventory Inflation Budget Based on Spare-parts and Miscellaneous Costs of a Typical Automobile Industry
...Show More Authors

Brainstorming has been a common approach in many industries where the result is not always accurate, especially when procuring automobile spare parts. This approach was replaced with a scientific and optimized method that is highly reliable, hence the decision to optimize the inventory inflation budget based on spare parts and miscellaneous costs of the typical automobile industry. Some factors required to achieve this goal were investigated. Through this investigation, spare parts (consumables and non-consumables) were found to be mostly used in Innoson Vehicle Manufacturing (IVM), Nigeria but incorporated miscellaneous costs to augment the cost of spare parts. The inflation rate was considered first due to the market's

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Stomatology
Preferences of treatments and materials used in the management of exposed pulps: a web-based questionnaire study
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 18 2022
Journal Name
Applied Sciences
The Influence of Flight Direction and Camera Orientation on the Quality Products of UAV-Based SfM-Photogrammetry
...Show More Authors

Unmanned aerial vehicles (UAVs) can provide valuable spatial information products for many projects across a wide range of applications. One of the major challenges in this discipline is the quality of positioning accuracy of the resulting mapping products in professional photogrammetric projects. This is especially true when using low-cost UAV systems equipped with GNSS receivers for navigation. In this study, the influence of UAV flight direction and camera orientation on positioning accuracy in an urban area on the west bank of the Euphrates river in Iraq was investigated. Positioning accuracy was tested in this study with different flight directions and camera orientation settings using a UAV autopilot app (Pix4Dcapture software

... Show More
View Publication
Scopus (10)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Nov 11 2019
Journal Name
Day 3 Wed, November 13, 2019
Drill Bit Selection Optimization Based on Rate of Penetration: Application of Artificial Neural Networks and Genetic Algorithms
...Show More Authors
Abstract<p>The drill bit is the most essential tool in drilling operation and optimum bit selection is one of the main challenges in planning and designing new wells. Conventional bit selections are mostly based on the historical performance of similar bits from offset wells. In addition, it is done by different techniques based on offset well logs. However, these methods are time consuming and they are not dependent on actual drilling parameters. The main objective of this study is to optimize bit selection in order to achieve maximum rate of penetration (ROP). In this work, a model that predicts the ROP was developed using artificial neural networks (ANNs) based on 19 input parameters. For the</p> ... Show More
View Publication
Crossref (7)
Crossref