Preferred Language
Articles
/
jih-1788
Very High Q-Factor Based On G-Shaped Resonator Type Metamaterial Absorber
...Show More Authors

High Q-factor based on absorption can be achieved by tuning (the reflection and the transition percentage). In this work, the simple design and simulated in S-band have been investigated. The simulation results of G-shape resonator are shown triple band of absorption peaks 60%, 91.5%, and 70.3%) at resonance frequency 2.7 GHz, 3.26 GHz, and 4.05 GHz respectively. The results exhibited very high of the Q-factor ( 271 ) at resonance frequency ( 3.26 GHz ).  The high Q-factor can be used to enhance the sensor sensing, narrowband band filter and  image sensing.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2012
Journal Name
2012 International Conference On Radar, Communication And Computing (icrcc)
BER performance improvement for secure wireless communication systems based on CSK- STBC techniques
...Show More Authors

There has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. This paper investigates the feasibility of using chaotic communications over Multiple-Input Multiple-Output (MIMO) channels by combining chaos modulation with a suitable Space Time Block Code (STBC). It is well known that the use of Chaotic Modulation techniques can enhance communication security. However, the performance of systems using Chaos modulation has been observed to be inferior in BER performance as compared to conventional communication

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Sep 01 2020
Journal Name
International Journal Of Hydrogen Energy
Hydrogen gas sensing based on nanocrystalline SnO2 thin films operating at low temperatures
...Show More Authors

View Publication
Scopus (32)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Sun Oct 03 2010
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Detection of Human Papilloma Viruses type 16 and type 18 in patients with transitional cell carcinoma of the bladder by in situ hybridization
...Show More Authors

Background: Transitional cell carcinomas (TCC) of the bladder are a major health problem. Recently, some studies link high risk Human papilloma viruses' type 16 and type 18 with bladder carcinoma.
Materials and methods: Fifty formalin fixed, paraffin embedded tissues with TCC of the bladder from Specialized Surgical Hospital in Baghdad were included in this study. In addition, ten
apparently normal bladder autopsies were collected from the Forensic Medicine Institute Archives and used as control group. Tissue blocks were sectioned and sticked on charged slides and used for the detection of HPV-16 and HPV-18.
Results: The expression of HPV-16 and HPV-18 DNA signals in TCC of the bladder tissues in the&nbs

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 30 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Thermal and Catalytic Degradation Kinetics of High-Density Polyethylene Over NaX Nano-Zeolite
...Show More Authors

Thermal and catalytic pyrolysis of waste plastics in an inert atmosphere has been regarded as a creative method, since pyrolysis can convert plastics waste into hydrocarbons that can be used either as fuels or as a source of chemicals.

Natural Iraqi kaolin clay was used to synthesis the NaX nano- zeolite by hydrothermal conditions with average particle size equal to 77.63nm.Thermal decomposition kinetics of high-density polyethylene (HDPE) in the absence and presence of catalysts nano NaX Zeolite was investigated. Thermal and catalytic degradation of HDPE was performed using a thermogravimetric analyzer in nitrogen atmosphere under non-isothermal conditions 4, 7 and 10 °C/min heating rates were employed in thermogravimetric anal

... Show More
View Publication Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Dielectric Breakdown Properties of He-H2 Mixtures for High Temperature Superconducting Power Devices
...Show More Authors

     In this study, the electron energy distribution function (EEDF), the electron swarm parameters , the effective ionization coefficients, and the critical field strength (dielectric strength) in binary He-H2 gas mixture which is used as cryogenic for high-temperature superconducting power applications,  are evaluated using two-term solution  of the Boltzmann equation over the range of E/N ( the electric field to gas density) from 1 to 100 Td ( 1 Td=10-17 Vcm2) at temperature 77 K and pressure 2MPa, taking into account elastic ( momentum transfer) and inelastic cross-sections. Using the electron energy distribution function (EEDF) electron swarm parameters (electron drift velocity, mean electron e

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Effect of High Dose of Soybean Meal on the Histology and Function of the Thyroid Gland in Albino Rat at Pre- and Postpuberty
...Show More Authors

The study aimed to determine the effect of soybean meal on the histological
structure and some functional parameters of the thyroid gland was investigated in
this study. For this purpose, 24 white male rats were divided into four groups each
of six rats, as following (G1): normal control rats, at the prepubertal life stage, were
dissected after 40 days from the weaning (i.e., from Postnatal Day "PND" 21),
(G2): prepubertal rats, were treated with high dose of soybean meal "40% of daily
diet" for 40 days after the weaning, (G3): normal control rats, at the postpubertal
stage, were dissected after 40 days from the puberty (i.e., from PND 60), (G4):
postpubertal rats, were treated with high dose of soybean meal (40%)

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Correlation Between Gene Expression of Interferon Regulatory Factor-5 and Disease Activity Index in Systemic Lupus Erythematosus Iraqi Patients
...Show More Authors

      Systemic lupus erythematosus (SLE) is a heterogeneous autoimmune disease characterized by elevated levels of circulating anti-nuclear autoantibodies and interferon-alpha (INFs-α). Interferon regulatory factor-5 (IRF5) plays an important role in the induction of type I interferon and pro-inflammatory cytokines, and participates in the SLE pathogenesis. This study aimed to investigate the role of IRF5 gene expression levels in a sample of SLE Iraqi patients and its correlation with disease activity, and to identify its diagnostic ability as a biomarker reflecting disease activity. Blood samples were taken from 45 participants diagnosed with SLE cases classified according to the American College of Rheumatology (ACR) criteria. T

... Show More
View Publication Preview PDF
Scopus Crossref