Preferred Language
Articles
/
ijp-1093
FTIR and Electrical Behavior of Blend Electrolytes Based on (PVA/PVP)
...Show More Authors

Polymer electrolytes were prepared using the solution cast technology. Under some conditions, the electrolyte content of polymers was analyzed in constant percent of PVA/PVP (50:50), ethylene carbonate (EC), and propylene carbonate (PC) (1:1) with different proportions of potassium iodide (KI) (10, 20, 30, 40, 50 wt%) and iodine (I2) = 10 wt% of salt. Fourier Transmission Infrared (FTIR) studies confirmed the complex formation of polymer blends. Electrical conductivity was calculated with an impedance analyzer in the frequency range 50 Hz–1MHz and in the temperature range 293–343 K. The highest electrical conductivity value of 5.3 × 10-3 (S/cm) was observed for electrolytes with 50 wt% KI concentration at room temperature. The magnitude of electrical conductivity was increased with the increase in the salt concentration and temperature. The blend electrolytes have a high dielectric constant at lower frequencies which may be attributed to the dipoles providing sufficient time to get aligned with the electric field, resulting in higher polarization. The reduction of activation energy (Ea) suggests that faster-conducting electrolyte ions want less energy to move.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
UAV Control Based on Dual LQR and Fuzzy-PID Controller
...Show More Authors

This paper presents the design of a longitudinal controller for an autonomous unmanned aerial vehicle (UAV). This paper proposed the dual loop (inner-outer loop) control based on the intelligent algorithm. The inner feedback loop controller is a Linear Quadratic Regulator (LQR) to provide robust (adaptive) stability. In contrast, the outer loop controller is based on Fuzzy-PID (Proportional, Integral, and Derivative) algorithm to provide reference signal tracking. The proposed dual controller is to control the position (altitude) and velocity (airspeed) of an aircraft. An adaptive Unscented Kalman Filter (AUKF) is employed to track the reference signal and is decreased the Gaussian noise. The mathematical model of aircraft

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (35)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Association Of Arab Universities Journal Of Engineering Sciences
Experimental and numerical investigation on the behavior of reinforced reactive powder concrete two-way slabs under static load
...Show More Authors

This paper studied the behaviour of reinforced reactive powder concrete (RPC) two-way slabs under static load. The experimental program included testing three simply supported slabs of 1000 mm length, 1000 mm width, and 70 mm thickness. Tested specimens were of identical properties except their steel fibers volume ratio (0.5 %, 1 %, and 1.5 %). Static test results revealed that, increasing steel fibers volume ratio from 0.5% to 1% and from 1% to 1.5%, led to an increase in: first crack load by (32.2 % and 52.3 %), ultimate load by (36.1 % and 17.0 %), ultimate deflection by (33.6 % and 3.4 %), absorbed energy by (128 % and 20.2 %), and the ultimate strain by (1.1 % and 6.73 %). The stiffness and ductility of the specimens also increased. A

... Show More
View Publication
Publication Date
Mon Feb 24 2025
Journal Name
Advances In Structural Engineering
Experimental and numerical investigation on the behavior of composite reinforced concrete columns encased by steel section and hybrid GFRP section
...Show More Authors

GFRP was employed in constructions as an alternative to steel, which has many advantages like lightweight, large tensile strength and resist corrosion. Existing researches are insufficient in studying the influence of hybrid reinforced concrete composite columns encased by GFRP I-section (RCCCEG) and I-section steel (RCCCES). In this study twenty one (RC) specimens of a cross-section of 130 mm × 160 mm, with different length (long 1600 mm and short 750 mm) were encased by using I-section (steel and GFRP) and tested under various loading (concentric, eccentric and flexural loads). The test was focused on the influence of many parameters; load-carrying capacity, mode of failure, deformation and drawing an interaction diagram (N-

... Show More
View Publication
Scopus (6)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Iraqi Journal Of Physics
Frequency Dependence of AC Resistivity and Dielectric Behavior of Lithium-Manganese Soft Ferrites
...Show More Authors

Lithium–Manganese ferrites having the chemical formula (Li0.5-0.5x Mnx Fe2.5-0.5x O4), (0 ≤ x ≤ 1) were prepared by double sintering powder processing. The density of the ferrite increased with Mn content while the porosity was noticed to decrease. The dielectric constant was found to increase at high frequencies more rapidly than the low ones. The dielectric constant found to decrease with Mn content. The decrease in loss factor with frequency agreed with Deby’s type relaxation process. A maximum of dielectric loss factor was observed when the hopping frequency is equal to the external electric field frequency. Manganese substitution reduced the dielectric loss in ferrite. The variation of tanδ with frequency shows a similar na

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 08 2021
Journal Name
Baghdad Science Journal
Synthesis and some of the electrical properties of the polymer Mosul poly Berrol
...Show More Authors

Thin films were prepared from poly Berrol way Ketrrukemaaih pole of platinum concentrations both Albaarol and salt in the electrolytic Alastontrel using positive effort of 7 volts on the pole and the electrical wiring of the membrane record

View Publication Preview PDF
Publication Date
Sun Dec 01 2013
Journal Name
Diyala Journal Of Engineering Sciences
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem
...Show More Authors

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref