Preferred Language
Articles
/
BRa4CYoBVTCNdQwCi5CS
Optical fiber sensor network integrating SAC-OCDMA and cladding modified optical fiber sensors coated with nanomaterial
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Static Performance Characteristics Of Vortex Rate Sensor
...Show More Authors

The vortex rate sensor is a fluidic gyroscope with no moving parts and can be used in very difficult conditions like radiation, high temperature and noise with minimum cost of manufacturing and maintenance. A vortex rate sensor made of wood has been designed and manufactured to study theoretically and experimentally its static performance .A rig has been built to carry out the study,
the test carried out with three different air flow rates (100, 150, and 200 l/min).The results show that the relation between the differential pressure taken from the sensor pickoff points and the angular velocity of the sensor was linear.The present work involved theoretical and experimental study of vortex rate sensor static characteristics .Vortex rat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Iraqi Journal Of Applied Physics
Calculations of Nuclear Two-Component State Density in Non-Equidistant Spacing Model with Modified Williams
...Show More Authors

Listed

View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Technology Reports Of Kansai University
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm

... Show More
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Nov 24 2024
Journal Name
Polymer-plastics Technology And Materials
Li <sub>2</sub> CO <sub>3</sub> as a Modifier for PVA/PVP/PEG Blend Polymer Electrolytes: Effects on Structural Integrity, Electrical Performance, Thermal Behavior and Optical Properties
...Show More Authors

View Publication
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Feb 19 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Evaluation of corrosion behavior of bioceramics coated commercially pure titanium and Ti-6Al-4V alloy
...Show More Authors

Background: This study report the corrosion behavior of commercially pure titanium and Ti-6Al-4V alloy samples without coating and with hydroxyapatite, partial stabilized zirconia and mixture of partial stabilized zirconia and hydroxyapatite coating and comparison between them through electrochemical polarization tests in 37 0 C Hank's solution. Materials and methods: Electrophoretic deposition technique (EPD) was used to achieve the coating from each one of three types of the coating materials (HAP, PSZ and mixture of 50% HAP and 50%PSZ) on Cp Ti and Ti-6Al-4V alloy samples. The electrochemical corrosion test was performed when samples were exposed to Hank's solution prepared in the laboratory and the polarization potential, corrosion rate

... Show More
View Publication Preview PDF
Publication Date
Thu Feb 19 2026
Journal Name
Journal Of Baghdad College Of Dentistry
Quantitative assessment of Mutans Streptococci adhesion to coated and uncoated orthodontic archwires(In vitro study)
...Show More Authors

Background: The development of orthodontic biomaterials that attract less biofilm has been a goal for decades. Adhesion and colonization of cariogenic streptococci are considered to play key roles in the development of enamel demineralization related to orthodontic materials. The aim of this study was to quantitatively evaluate the Mutans streptococci adhesion to coated orthodontic archwires (Epoxy and Teflon) and uncoated archwires (stainless steel and nickel-titanium) with respect to incubation time in the presence and absence of saliva. Material and Method: Six types of archwires stainless steel and nickel titanium with two type of coating (Epoxy, Teflon) were used in this study. Twelve specimens of each archwire were incubated in steri

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 21 2012
Journal Name
J.food Industries And Nutr. Sci
Preparation and Characterization of Maleate, Tartarate,and Phthalate Modified Pectin
...Show More Authors

Preparation and Characterization of Maleate, Tartarate,and Phthalate Modified Pectin

Publication Date
Sat Jan 01 2022
Journal Name
International Middle Eastern Simulation And Modelling Conference 2022, Mesm 2022,
MECHANICS OF COMPOSITE PLATE STRUCTURE REINFORCED WITH HYBRID NANO MATERIALS USING ARTIFICIAL NEURAL NETWORK
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref