Preferred Language
Articles
/
xRYJyYsBVTCNdQwCg955
Liquid crystal behavior of Ag(I) complexes based on a series of mesogenic 1,3,4-thiadiazole ligands
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 01 2019
Journal Name
Iraqi Journal Of Physics
Study the effect of Ag nanoparticles and ZnO nanoparticles at different concentrations on the viscosity and surface tension of Polyacrylamide solutions
...Show More Authors

Polyacrylamide Solutions of different concentrations (0.2, 0.4, 0.6, 0.8, 1.0 %) of Ag nanoparticles and ZnO nanoparticles were prepared, the viscosities and surface tension were measured for all solutions, where measurements indicated an increase in these properties with increased concentration, where the relative viscosity of polyacrylamide/zinc nanoparticles increased from 1.275 to 2.243, and the relative viscosity of polyacrylamide/silver nanoparticles increased from 1.178 to 1.934. Viscosity is significant parameters during electrospinning process. While the surface tension of the polyacrylamide/zinc nanoparticles has changed from 0.0343 Nm-1 to .0.0.0 Nm-1 and changed from .0.000Nm-1 to.0.0.0 Nm-1. Also the constants KH and KK were

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Notes On The Non Linear Operator Equation I AXAX n
...Show More Authors

Necessary and sufficient conditions for the operator equation I AXAX n*, to have a real positive definite solution X are given. Based on these conditions, some properties of the operator A as well as relation between the solutions X andAare given.

Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Comparative Evaluation of the Effect of Different Universal Adhesives and Bonding Techniques on the Marginal Gap of Class I Composite Restoration (A SEM Study)
...Show More Authors

Background: With the increase in composite material use in posterior teeth, the concerns about the polymerization shrinkage has increased with the concerns about the formation of marginal gaps in the oral cavity environment. New generation of adhesives called universal adhesive have been introduced to the market in order to reduce the technique sensitive bonding procedures to give the advantage of using the bonding system in any etching protocol without compromising the bonding strength. The aim of the study was to study marginal adaptation of two universal adhesives (Single bondâ„¢ Universal and Prime and Bond elect) using 3 etching techniques under thermal cycling aging. Materials and Methods: Forty-eight sound maxillary first premola

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Investigation of Size-dependent Nonlinearity of Ag Nano-Fluids using Self-defocusing Technique
...Show More Authors

In this work, the effect of different particle size on the nonlinear optical properties of silver nanoparticles in de-ionized water was studied. The experimental observation of the far field diffraction patterns by CCD camera in two and three dimensions. The maximum change of nonlinear refractive index and the relative phase shift were calculated. The self-defocusing technique was used with a continuous-wave radiation from DPSS Blue laser .The wavelength is 473 nm with an output power of 270 mW. All the Ag colloids samples containing the sizes 15, 30, 50, and 70 nm of silver nanoparticles used in the study were chemically prepared. It was found that the nonlinear refractive index is a particle size dependent and of the order of 10-7 cm2/

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Bulletin Of Electrical Engineering And Informatics
A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property
...Show More Authors

A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side and commences from random independent initial states. The structure of the proposed model consists of the three components of a mouse input device, the proposed 2D chaotic system, and an initial permutation (IP) table. Statist

... Show More
View Publication
Scopus (14)
Crossref (7)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The classification of fetus gender based on fuzzy C-mean using a hybrid filter
...Show More Authors

This paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT),(median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Laplace has recorded a better accuracy. Our experimental evaluation on re

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Separation And Purification Technology
A comprehensive review on the use of Ti3C2Tx MXene in membrane-based water treatment
...Show More Authors

View Publication
Scopus (17)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
The Classification of Fetus Gender Based on Fuzzy C-Mean Using a Hybrid Filter
...Show More Authors
Abstract<p>This paper proposes a new approach, of Clustering Ultrasound images using the Hybrid Filter (CUHF) to determine the gender of the fetus in the early stages. The possible advantage of CUHF, a better result can be achieved when fuzzy c-mean FCM returns incorrect clusters. The proposed approach is conducted in two steps. Firstly, a preprocessing step to decrease the noise presented in ultrasound images by applying the filters: Local Binary Pattern (LBP), median, median and discrete wavelet (DWT), (median, DWT & LBP) and (median & Laplacian) ML. Secondly, implementing Fuzzy C-Mean (FCM) for clustering the resulted images from the first step. Amongst those filters, Median & Lap</p> ... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (22)
Crossref