Preferred Language
Articles
/
Qhb1mocBVTCNdQwCq1gA
Structural and Optical Properties of ZnO Nanostructures Synthesized by Hydrothermal Method at Different Conditions
...Show More Authors

Zinc oxide (ZnO) nanoparticles were synthesized using a modified hydrothermal approach at different reaction temperatures and growth times. Moreover, a thorough morphological, structural and optical investigation was demonstrated using scanning electron microscopy (SEM), x-ray diffraction (XRD), ultra-violate visible light spectroscopy (UV-Vis.), and photoluminescence (PL) techniques. Notably, SEM analysis revealed the occurrence of nanorods-shaped surface morphology with a wide range of length and diameter. Meanwhile, a hexagonal crystal structure of the ZnO nanoparticles was perceived using XRD analysis and crystallite size ranging from 14.7 to 23.8 nm at 7 and 8 ℎ𝑟𝑠., respectively. The prepared ZnO samples showed good absorbance spectra along the UV-Vis wavelength alongside various optical bandgaps at different reaction temperatures and growth times. Subsequently, the PL analysis demonstrated two primary instinct band emissions at the UV and visible light regions. The bandgap and defect sites obtained during the PL analysis revealed that reaction temperature and growth time play a crucial role in the alignment of the bandgap and defects. ZnO sample prepared at 100 °𝐶 and 8 ℎ𝑟𝑠. exhibited the upmost bandgap value (3.351 𝑒𝑉).

Publication Date
Mon Nov 21 2022
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn: 2789-3219 )
Nanotechnology at the Molecular Level
...Show More Authors

Materials with external dimensions of one or more nanometers are referred to as nanomaterials. These structures result from a number of manufacturing processes. They are used in many industries, including pharmaceuticals, which is the most significant one. Numerous variables, including size, shape, surface morphology, crystallinity, solubility, etc., affect physical properties. While new physical and chemical processes are being created constantly, the biological method is the ideal strategy for synthesizing nanoparticles since it is straightforward, safe, and economical. Different kinds of nanoparticles can be metabolically synthesized by a wide variety of biological sources, including plants, bacteria, fungi, and yeast. There are

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Digital Literacy at The University
...Show More Authors

The revolution of technology in the 21st century has changed radically the
climate of opinion concerning second language education. In order to excel in
today’s world, teachers and learners need to adopt new roles and be equipped with
new skills and competencies that go beyond the basic ones of listening, speaking,
reading, and writing; skills that cannot be gained if teachers teach mere academic
subjects, and students are evaluated on how well they have learnt the minute sub
skills in those content areas.
This session will touch upon several skills which may be considered the
new basics of the 21st century. Among these skills are: autonomy, active learning,
critical thinking, cooperative learning, and digita

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 05 2011
Journal Name
Baghdad Science Journal
Cutaneous leishmaniasis at Wasit governorate
...Show More Authors

The study included identification of Leishmania parasites from cases of cutaneous leishmaniasis, by examination of smears for LD bodies , isolation of parasites by culture in media , and characterisation of the isolated parasites by Isoenzyme analysis.Out of 100 cases suspected for cutaneous leishmaniasis ; 85 were diagnosed on culture for Leishmania promastigotes and this method was found to be superior to direct microscopy for amastgotes (LD bodies) .The cases included in this study belonged to different areas of Wasit/Iraq. There were 30 cases from Hay, 35 from Badra, and 35 cases from Suwaira.The distribution of infection in different age groups indi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 26 2021
Journal Name
Plant Archives
THE RESPONSE OF GROWTH OF SOME LAWN PLANTS TO CHEMICAL FERTILIZATION WITH HUMIC ACID UNDER LOW-LIGHT CONDITIONS OF HOUSE GARDEN
...Show More Authors

Shade in house gardens is one of the problems that hinder the growth of lawn and its distribution in the soil, where the types of lawns differ in their durability and adaptation to shade. The research aims to know the resistance of some species of lawn plants to shade and to know the appropriate fertilization procedures that can be followed to reduce the negative effects. The study was conducted in the Amiriya district of Baghdad in a house garden. Three varieties of lawn plants Bermuda, Gazon, and Trifoglio were planted. Five fertilization treatments (contained N and P elements) and the control were used. The sunlight density with the temperature of the study field locations were estimated using the AMT-300 and the vegetation coverage perc

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2017
Journal Name
Archive Of Mechanical Engineering
Using the Lid-Driven Cavity Flow to Validate Moment-Based Boundary Conditions for the Lattice Boltzmann Equation
...Show More Authors
Abstract<p>The accuracy of the Moment Method for imposing no-slip boundary conditions in the lattice Boltzmann algorithm is investigated numerically using lid-driven cavity flow. Boundary conditions are imposed directly upon the hydrodynamic moments of the lattice Boltzmann equations, rather than the distribution functions, to ensure the constraints are satisfied precisely at grid points. Both single and multiple relaxation time models are applied. The results are in excellent agreement with data obtained from state-of-the-art numerical methods and are shown to converge with second order accuracy in grid spacing.</p>
View Publication
Scopus (22)
Crossref (18)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
FINITE ELEMENT METHOD FOR INCOMPRESSIBLE VISCOELASTIC MATERIALS
...Show More Authors

A numerical method (F.E.)was derived for incompressible viscoelastic materials, the aging and
environmental phenomena especially the temperature effect was considered in this method. A
treatment of incompressibility was made for all permissible values of poisons ratio. A
mechanical model represents the incompressible viscoelastic materials and so the properties can
be derived using the Laplace transformations technique .A comparison was made with the other
methods interested with viscoelastic materials by applying the method on a cylinder of viscoelastic material surrounding by a steel casing and subjected to a constant internal pressure, as well as a comparison with another viscoelastic method and for Asphalt Concrete pro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Suggested method for modifying the site parameter
...Show More Authors

     Estimating multivariate location and scatter with both affine equivariance and positive break down has always been difficult. Awell-known estimator which satisfies both properties is the Minimum volume Ellipsoid Estimator (MVE) Computing the exact (MVE) is often not feasible, so one usually resorts to an approximate Algorithm. In the regression setup, algorithm for positive-break down estimators like Least Median of squares typically recomputed the intercept at each step, to improve the result. This approach is called intercept adjustment. In this paper we show that a similar technique, called location adjustment, Can be applied to the (MVE). For this purpose we use the Minimum Volume Ball (MVB). In order

... Show More
View Publication Preview PDF
Crossref