Preferred Language
Articles
/
jih-421
Improved 𝑫−𝑯𝒆 𝟑 Fusion Reaction Characteristics Parameters
...Show More Authors

   The most likely fusion reaction to be practical is Deuterium and Helium-3 (𝐷−𝐻𝑒
 3 ), which is highly desirable because both Helium -3 and Deuterium are stable and the reaction produces a 14 𝑀𝑒𝑉 proton instead of a neutron and the proton can be shielded by magnetic fields. The strongly dependency of the basically hot plasma parameters such as reactivity, reaction rate, and energy for the emitted protons, upon the total cross section, make the problems for choosing the desirable formula for the cross section, the main goal for our present work.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials & Continua
Credit Card Fraud Detection Using Improved Deep Learning Models
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Sat Jun 25 2022
Journal Name
International Journal Of Drug Delivery Technology
Preparation of Posaconazole Nanosponges for Improved Topical Delivery System
...Show More Authors

The objective of the current research was to develop the posaconazole (PCZ) loaded NS into the carbopol 934 polymeric gel for prolonged drug release and improved topical delivery; seven different nanosponge formulations of PCZ were formulated using the emulsion solvent diffusion method using various amounts of polymer (ethylcellulose, EC). The aqueous and dispersed phases were prepared using polyvinyl alcohol (PVA) and dichloromethane. The prepared nanosponges (NS) were studied for particle size, structural appearance, and in vitro drug release. Furthermore, the selected formula was formulated as hydrogel and was evaluated for physical characteristics, drug content, and in-vitro drug release. Morphological studies revealed irregular

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Oct 20 2021
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Polymer Chain Reaction (PCR): Principle and Applications
...Show More Authors

The new, standard molecular biologic system for duplicating DNA enzymatically devoid of employing a living organism, like E. coli or yeast, represents polymerases chain reaction (PCR). This technology allows an exponential intensification of a minor quantity of DNA molecule several times. Analysis can be straightforward with more DNA available.

A thermal heat cycler performs a polymerization chain reaction that involves repeated cycles of heating and cooling the reactant tubes at the desired temperature for each reaction step. A heated deck is positioned on the upper reaction tube to avoid evaporating the reaction mixture (normally volumes range from 15 to 100 l per tube), or an oil layer can be placed on a reaction mixture surfa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 01 2022
Journal Name
Iraqi Journal Of Science
Characterization of CdS nanoparticles Prepared by Liquid – Liquid Interface Reaction
...Show More Authors

Liquid – liquid interface reaction is one of the method to prepare nanoparticles, the preparation of nanoparticles depends on the super saturation of ions which can satisfy by layered two immiscible liquid (toluene and deionized (DI) water). The XRD-diffraction analysis give a mix structure from hexagonal and cubic and the average grain size is 7.73 nm using Sherrer relation and 9.54 nm using Williamson –Hall method. Transmission electron microscopy (TEM) Showed that the size of particles around 3 nm which is comparable with Bohr radius of CdS.
From UV-Visible spectrum analysis which use two model to estimate the radius of particles , the first one is effective mass approximate (EMA) model and the second one is tight binding model

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
Blow-up Properties of a Coupled System of Reaction-Diffusion Equations
...Show More Authors

    This paper is concerned with a Coupled Reaction-diffusion system defined in a ball with homogeneous Dirichlet boundary conditions. Firstly, we studied the blow-up set showing that, under some conditions, the blow-up in this problem occurs only at a single point. Secondly, under some restricted assumptions on the reaction terms, we established the upper (lower) blow-up rate estimates. Finally, we considered the Ignition system in general dimensional space as an application to our results.

View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
International Conference Of Numerical Analysis And Applied Mathematics Icnaam 2019
Isolation and characterization study towards microbial improved oil recovery applications
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 01 2015
Journal Name
Iraqi Journal Of Science
Improved Rijndael Algorithm by Encryption S-Box Using NTRU Algorithm
...Show More Authors

With the wide developments of computer applications and networks, the security of information has high attention in our common fields of life. The most important issues is how to control and prevent unauthorized access to secure information, therefore this paper presents a combination of two efficient encryption algorithms to satisfy the purpose of information security by adding a new level of encryption in Rijndael-AES algorithm. This paper presents a proposed Rijndael encryption and decryption process with NTRU algorithm, Rijndael algorithm is widely accepted due to its strong encryption, and complex processing as well as its resistance to brute force attack. The proposed modifications are implemented by encryption and decryption Rijndael

... Show More
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
An Improved Probability Density Function (PDF) for Face Skin Detection
...Show More Authors

      Face Detection by skin color in the field of computer vision is a difficult challenge. Detection of human skin focuses on the identification of pixels and skin-colored areas of a given picture. Since skin colors are invariant in orientation and size and rapid to process, they are used in the identification of human skin. In addition features like ethnicity, sensor, optics and lighting conditions that are different are sensitive factors for the relationship between surface colors and lighting (an issue that is strongly related to color stability). This paper presents a new technique for face detection based on human skin. Three methods of Probability Density Function (PDF) were applied to detect the face by skin color; these ar

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Improved Automatic Registration Adjustment of Multi-source Remote Sensing Datasets
...Show More Authors

Registration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration p

... Show More
View Publication Preview PDF