Preferred Language
Articles
/
bsj-2554
Superconducting Properties of the (Bi0.8Pb0.2)2(Sr0.9Ba0.1)2 Ca2Cu3-x Nix O10+? System.
...Show More Authors

The effect of substitution of Ni on Cu in (Bi0.8Pb0.2)2(Sr0.9Ba0.1)2 Ca2Cu3-x Nix O10+? for (x=0,0.1….1,2,3) superconductor system and sintering time has been investigated .The samples were prepared by solid-state reaction methods. The results show that the optimum sintering temperature is equal to 850 ºC, and the sintering time is equal to 140 h. The highest transition temperature (Tc) obtained for (Bi0.8Pb0.2)2(Sr0.9Ba0.1)2 Ca2Cu3-x NixO10+? composition was 113 with x=0.8 Phase analyses of the samples by X-ray diffraction (XRD) analysis showed an orthorhombic structure with a high Tc phases (2223) as a dominant phase and low Tc phase (2212) in addition to some impurity phases.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Mar 24 2009
Journal Name
Proceeding Of 3d Scientific Conference Of The College Of Science, University Of Baghdad 24 To 26 March 2009
Bacterial DNA induces inflammations in murine renal system
...Show More Authors

Abstract Since unmethylated CpG motifs are more common in DNA from bacteria than vertebrates, and the unmethylated CpG motif has recently been reported to have stimulatory effects on lymphocytes, we speculated that bacterial DNA may induce inflammation in the urinary tract. To determine the role of bacterial DNA in lower UTI, we intraurethrally injected prokaryotic DNA (extracted from E. coli) in white mice and performed histopathological study for the kidneys and urinary bladders, 24 h after the exposure. The results showed infiltration of inflammatory cells, shrinkage of glomerulus and increase the capsular space, as well as edema formation in kidney tissues. Moreover, urinary bladder sections showed infiltration of inflammatory cells.

... Show More
Publication Date
Fri Mar 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Emergency Fuel Rationing system using RFID Smart Cards
...Show More Authors

Rationing is a commonly used solution for shortages of resources and goods that are vital for the citizens of a country. This paper identifies some common approaches and policies used in rationing as well asrisks that associated to suggesta system for rationing fuelwhichcan work efficiently. Subsequently, addressing all possible security risks and their solutions. The system should theoretically be applicable in emergency situations, requiring less than three months to implement at a low cost and minimal changes to infrastructure.

View Publication Preview PDF
Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Hybrid LDPC-STBC communications system based on chaos
...Show More Authors

View Publication
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2024
Journal Name
Bulletin Of Electrical Engineering And Informatics
A systematic literature review for smart hydroponic system
...Show More Authors

Hydroponics is the cultivation of plants by utilizing water without using soil which emphasizes the fulfillment of the nutritional needs of plants. This research has introduced smart hydroponic system that enables regular monitoring of every aspect to maintain the pH values, water, temperature, and soil. Nevertheless, there is a lack of knowledge that can systematically represent the current research. The proposed study suggests a systematic literature review of smart hydroponics system to overcome this limitation. This systematic literature review will assist practitioners draw on existing literature and propose new solutions based on available knowledge in the smart hydroponic system. The outcomes of this paper can assist future r

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Fri Mar 15 2024
Journal Name
2024 International Conference On Distributed Computing And Optimization Techniques (icdcot)
Reconfigurable Microstrip Antenna Design Fifth Generation (5G) System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Machine Learning Approach for Facial Image Detection System
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, Iraqi Journal of Science, 2023

View Publication
Scopus (7)
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Transactions On Computers
Neuromorphic System for Spatial and Temporal Information Processing
...Show More Authors

View Publication
Scopus (21)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Mon Jun 04 2018
Journal Name
Baghdad Science Journal
Effect the Thickness on the Electrical Properties and (I-V) Character of the (CdTe) Thin Films and Find the Efficiency of Solar Cell CdTe/CdS
...Show More Authors

Thin films of CdTe were prepared with thickness (500, 1000) nm on the glass substrate by vacuum evaporation technique at room temperature then treated different annealing temperatures (373,473,and 573)K for one hour. Results of the Hall Effect and the electrical conductivity of (I-V) characteristics were measured in darkness and light.at different annealing temperature results show that the thin films have ability to manufacture solar cells, and found that the efficient equal to (2.18%) for structure solar cell (Algrid / CdS / CdTe /glass/ Al) and the efficient equal to (1.12%) for structure solar cell (Algrid / CdS / CdTe /Si/ Al) with thick ness of (1000) nm with CdTe thin films at RT.

View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref