Preferred Language
Articles
/
wRccfY8BVTCNdQwCIXms
Preparation of Al2O3 /PVA Nanocomposite Thin Films by a Plasma Jet Method
...Show More Authors

Alumina thin films have significant applications in the areas of optoelectronics, optics, electrical insulators, sensors and tribology. The novel aspect of this work is that the homogeneous alumina thin films were prepared in several stages to generate a plasma jet. In this paper, aluminium nanoparticles suspended in vinyl alcohol were prepared using exploding wire plasma. TEM analysis was used to determine the size and shape of particles in aluminium and vinyl alcohol suspensions; the TEM images showed that the particle size is 17.2 nm. Aluminium/poly vinyl alcohol (Al/PVA) thin films were prepared using this suspension on quartz substrate by plasma jet technique at room temperature with an argon gas flow rate of 1 L/min. The Al/PVA thin films were thermally converted to alumina films, where they were annealed at different temperatures (700, 800, or 900°C). X-ray diffraction (XRD), atomic force microscopy (AFM), transmission electron microscopy (TEM), scanning electron microscopy (SEM), and Fourier transform infrared spectroscopy (FTIR) techniques were used to characterise these thin films before and after annealing process. The diffraction patterns of the prepared thin films before subjecting them to the annealing process indicated the presence of peaks belonging to aluminium and PVA; however, the diffraction patterns and FTIR spectra obtained for these films after the annealing process showed peaks indicating the formation of alumina films of different phases. AFM and SEM investigations proved that the formed particles for all prepared films before and after the annealing process were similar in size and almost spherical; the diameter of the particles was on the order of a few nanometres. To control the properties of prepared thin films, the plasma which was used to produce thin films is diagnosed spectrophotometrically. The generated plasma was diagnosed using optical emission spectroscopy to estimate the electron temperature Te; the electron temperature was 1.925 eV.

Scopus Crossref
View Publication
Publication Date
Mon Jun 04 2018
Journal Name
Baghdad Science Journal
Comparative NO2 Sensing Characteristics of SnO2:WO3 Thin Film Against Bulk and Investigation of Optical Properties of the Thin Film
...Show More Authors

A comparative investigation of gas sensing properties of SnO2 doped with WO3 based on thin film and bulk forms was achieved. Thin films were deposited by thermal evaporation technique on glass substrates. Bulk sensors in the shape of pellets were prepared by pressing SnO2:WO3 powder. The polycrystalline nature of the obtained films with tetragonal structure was confirmed by X-ray diffraction. The calculated crystalline size was 52.43 nm. Thickness of the prepared films was found 134 nm. The optical characteristics of the thin films were studied by using UV-VIS Spectrophotometer in the wavelength range 200 nm to 1100 nm, the energy band gap, extinction coefficient and refractive index of the thin film were 2.5 eV , 0.024 and 2.51, respective

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A New Feature-Based Method for Similarity Measurement under the Linux Operating System
...Show More Authors

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Aug 01 2019
Journal Name
مجلة العلوم الاقتصادية والإدارية
Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application
...Show More Authors

Improving" Jackknife Instrumental Variable Estimation method" using A class of immun algorithm with practical application

Publication Date
Thu May 28 2020
Journal Name
Journal Of Generic Medicines: The Business Journal For The Generic Medicines Sector
Determinants of national drug products acceptance across patients, pharmacists, and manufacturers: A mixed method study
...Show More Authors
Introduction

The national pharmaceutical industry is pivotal for both the health sector and the national economy. This study aims to identify determinants of national drug products acceptance. The objectives of this study were to quantitatively measure the level of patient and community pharmacist acceptance of national drug products available in community pharmacies and to qualitatively explore the barriers facing national pharmaceutical companies and investigate the suggested solutions.

Methods

This cross-sectional study used an explanatory mixed method design. It was conducted in Baghdad, Iraq from July through October 2018. The stud

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Mon Feb 21 2022
Journal Name
Научный форум: Филология, искусствоведение и культурология: сб. ст. по материалам Lvi междунар. науч.-практ. конф. – No 2 (56). – М
Comparative analysis of zoomorphic metaphors in Russian and Arabic as a method for studying linguoculturology
...Show More Authors

: zonal are included in phraseological units, form metaphorical names for a person, give him various emotional and evaluative characteristics. This article examines the topic of zoomorphic metaphors that characterize a person in the Russian and Arabic languages in the aspect of their comparative analysis, since the comparative analysis of the metaphorical meanings of animalisms is an important method for studying cultural linguistics, since zoomorphic metaphors are a reflection of culture in a language.

Preview PDF