Preferred Language
Articles
/
xBdjbI4BVTCNdQwCRUdC
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri May 03 2024
Journal Name
Journal Of Optics
Transmission Of 10 Gb/s For Underwater Optical Wireless Communication System
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Effect ofweight percentage chopped carbon fibers on the mechanism of cracks propagation for Epoxy composites
...Show More Authors

In this research, the mechanism of cracks propagation for epoxy/ chopped carbon fibers composites have been investigated .Carbon fibers (5%, 10%, 15%, and 20%) by weight were used to reinforce epoxy resin. Bending test was carried out to evaluate the flexural strength in order to explain the mechanism of cracks propagation. It was found that, the flexural strength will increase with increasing the percentage weight for carbon fibers. At low stresses, the cracks will state at the lower surface for the specimen. Increasing the stresses will accelerate the speed of cracks until fracture accorded .The path of cracks is changed according to the distributions of carbon fibers

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Clinical And Experimental Dentistry
The effect of osseodensification on implant stability and bone density: A prospective observational study
...Show More Authors

Background: The aims of this study were to evaluate the effect of implant site preparation in low-density bone using osseodensification method in terms of implant stability changes during the osseous healing period and peri-implant bone density using CBCT. Material and methods: This prospective observational clinical study included 24 patients who received 46 dental implants that were installed in low-density bone using the osseodensification method. CBCT was used to measure the bone density pre- and postoperatively and implant stability was measured using Periotest® immediately after implant insertion and then after 6 weeks and 12 weeks postoperatively. The data were analyzed using paired t-test and the probability value <0.05 was conside

... Show More
View Publication
Scopus (20)
Crossref (20)
Scopus Crossref
Publication Date
Tue Nov 01 2022
Journal Name
2022 International Conference On Data Science And Intelligent Computing (icdsic)
An improved Bi-LSTM performance using Dt-WE for implicit aspect extraction
...Show More Authors

In aspect-based sentiment analysis ABSA, implicit aspects extraction is a fine-grained task aim for extracting the hidden aspect in the in-context meaning of the online reviews. Previous methods have shown that handcrafted rules interpolated in neural network architecture are a promising method for this task. In this work, we reduced the needs for the crafted rules that wastefully must be articulated for the new training domains or text data, instead proposing a new architecture relied on the multi-label neural learning. The key idea is to attain the semantic regularities of the explicit and implicit aspects using vectors of word embeddings and interpolate that as a front layer in the Bidirectional Long Short-Term Memory Bi-LSTM. First, we

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Mar 01 2022
Journal Name
The International Journal Of Nonlinear Analysis And Applications
Improved optimality checkpoint for decision making by using the sub-triangular form
...Show More Authors

Decision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Improved Runge-Kutta Method for Oscillatory Problem Solution Using Trigonometric Fitting Approach
...Show More Authors

This paper provides a four-stage Trigonometrically Fitted Improved Runge-Kutta (TFIRK4) method of four orders to solve oscillatory problems, which contains an oscillatory character in the solutions. Compared to the traditional Runge-Kutta method, the Improved Runge-Kutta (IRK) method is a natural two-step method requiring fewer steps. The suggested method extends the fourth-order Improved Runge-Kutta (IRK4) method with trigonometric calculations. This approach is intended to integrate problems with particular initial value problems (IVPs) using the set functions  and   for trigonometrically fitted. To improve the method's accuracy, the problem primary frequency  is used. The novel method is more accurate than the conventional Runge-Ku

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 17 2017
Journal Name
Wireless Personal Communications
ITPMAP: An Improved Three-Pass Mutual Authentication Protocol for Secure RFID Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 26 2019
Journal Name
International Journal Of Mathematics And Mathematical Sciences
Stability and Bifurcation of a Prey-Predator-Scavenger Model in the Existence of Toxicant and Harvesting
...Show More Authors

In this paper a prey-predator-scavenger food web model is proposed and studied. It is assumed that the model considered the effect of harvesting and all the species are infected by some toxicants released by some other species. The stability analysis of all possible equilibrium points is discussed. The persistence conditions of the system are established. The occurrence of local bifurcation around the equilibrium points is investigated. Numerical simulation is used and the obtained solution curves are drawn to illustrate the results of the model. Finally, the nonexistence of periodic dynamics is discussed analytically as well as numerically.

Scopus (28)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Applications
A proposed method for cleaning data from outlier values using the robust rfch method in structural equation modeling
...Show More Authors

View Publication Preview PDF
Scopus (2)
Scopus