Preferred Language
Articles
/
GRj-c5QBVTCNdQwCLRgh
Synthesis of PPy- Nd2O3 nano-composite for utilization in supercapacitor applications
...Show More Authors

In this study, chemical oxidation was employed for the synthesis of polypyrrole (PPy) nanofiber. Furthermore, PPy has been subjected to treatment using nanoparticles of neodymium oxide (Nd2O3), which were produced and added in a certain ratio. The inquiry centered on the structural characteristics of the blend of polypyrrole and neodymium oxide after their combination. The investigation utilises X-ray diffraction (XRD), FTIR, and Field Emission Scanning Electron Microscopy (FE-SEM) for PPy, 10%, 30%, and 50% by volume of Nd2O3. According to the electrochemical tests, it has been noted that the nanocomposites exhibit a substantial amount of pseudocapacitive activity.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Nov 22 2023
Journal Name
Drug And Chemical Toxicology
Preparation, characterization, and toxicity evaluation of microemulsion formulation containing prunetin for potential oral applications
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
New Approaches of Cloud Services Access using Tonido Cloud Server for Real-Time Applications
...Show More Authors

A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 20 2018
Journal Name
Al-academy
Simulation and its applications in contemporary graphic design
...Show More Authors

   The simulation is the oldest theory in art, since it appeared in the Greek aesthetic thought of the philosopher Plato, as we find in many of the thinkers and philosophers over a wide period of time to reach our world today. Our fascination with art in general and design art in particular is due to the creativity and innovations of the artist through the simulation, as well as the peculiarities in this simulation, which give objects signs and signals that may have an echo that sometimes does not exist in their physical reality.

   The real representation of life and design construction, descriptions of the expression of each of them in the form of intellectual construction and the ideas of producti

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Al-academy
Pedagogy and its applications in art education curricula
...Show More Authors

               The research aims to (identify the applications of pedagogy in art education), the research community included, art education for the primary stage, so the community consisted of (8) main areas in art education, either the research sample was chosen, two main areas (objectives, and content), and included the research methodology (descriptive and analytical), the researcher built the research tool represented (the validity form of the tool) and presented to a group of experts to indicate its validity as well as to measure its stability,  To show the results, the researcher used the percentage, and the researcher recommended - modifying the curriculum every period of time, such as every four years, others

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Dec 31 2017
Journal Name
College Of Islamic Sciences
Jurisprudential applications to restrict permissible in Islamic jurisprudence
...Show More Authors

Research summary

 


Muslim scholars have established fundamental rules for deriving rulings to be a methodology for every mujtahid who wants to extract rulings from his reliable sources, and one of the most prominent fundamental rules on which many rulings are built is the permissible and the many rulings related to it.

Leaving what is permissible on its own terms sometimes causes embarrassment and distress in some cases, so we need something that restricts it. In our Islamic law, many legal rulings are embodied in which the restriction of what is permissible is in the public interest, or to relieve embarrassment in public.

Because of the importance of this fundamentalist rule, and the difference in some

... Show More
View Publication Preview PDF
Publication Date
Sat Sep 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Study of Mechanical Characteristics for Polymer Composite Reinforced by Particles of (Al2O3) or (Al)
...Show More Authors

A particulate polymer composite material was prepared by reinforcing with the Aluminum Oxide (Al2O3) or Aluminum (Al) metallic particles with a particle size of (30) µm to an unsaturated Polyester Resin with a weight fraction of (5%, 10%, 15%, 20%).

Tensile test results showed the maximum value of elastic modulus reached (2400MPa.)  in the case of reinforcing with (Al) particles with weight fraction (20%) and (1500 MPa.)  in the case of reinforcing with (Al2O3) particles of the same weight fraction.

  When the impact and the flexural strength tests were done, the results showed that flexural strength (F.S), maximum shear stress (τmax), impact strength

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Ultra low power and highly linearized LNA for V-band RF applications in 180 nm CMOS technology
...Show More Authors

Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Iraqi Journal Of Physics
Prospect of CW Raman Laser in Silicon- on- Insulator Nano-Waveguides
...Show More Authors
 
Numerical analysis predicts that continuous-wave (CW) Raman lasing is possible in Silicon-On-insulator (SOI) nano-waveguides, despite of presence of free carrier absorption. The scope of this paper lies on lasers for communication systems around 1550 nm wavelength. Two types of waveguide structures Strip and Rib waveguides have been incorporated. The waveguide structures have designed to be 220 nm in height. Three different widths of (350, 450, 1000) nm were studied. The dependence of lasing of the SOI Raman laser on effective carrier lifetime was discussed, produced by tow photon absorption. At telecommunication wavelength of 1550 nm, Raman lasing threshold was calculated to be 1.7 mW in Rib SOI waveguide with dimen
... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Al–bahith Al–a'alami
The Role of Internet and its Applications in Spreading Rumors
...Show More Authors

The study tries to answer several questions posed by the subject, one of the important: How the Internet promotes rumor? And what are the most Internet applications that promote rumor? And the practical ways to reduce these negative? Using the process of in vestige and reading theoretical heritage available in this field, and inferred the numbers and statistics marked the uses of the Internet and its applications over recent years, and the characteristics of each these tools in the field of collection, processing, and dissemination of information

View Publication Preview PDF
Crossref