Preferred Language
Articles
/
ijp-271
Chemical sensor based on a solid-core photonic crystal fiber interferometer
...Show More Authors

Photonic crystal fiber interferometers are used in many sensing applications. In this work, an in-reflection photonic crystal fiber (PCF) based on Mach-Zehnder (micro-holes collapsing) (MZ) interferometer, which exhibits high sensitivity to different volatile organic compounds (VOCs), without the needing of any permeable material. The interferometer is robust, compact, and consists of a stub photonic crystal fiber of large-mode area, photonic crystal fiber spliced to standard single mode fiber (SMF) (corning-28), this splicing occurs with optimized splice loss 0.19 dB In the splice regions the voids of the holey fiber are completely collapsed, which allows the excitation and recombination of core and cladding modes. The device reflection spectrum exhibits a sinusoidal interference pattern which shifts differently when the voids of the PCF are infiltrated with VOC molecules. The volume of voids responsible for the shift is less than 5microliters whereas the detectable levels are in the nanomole range. Laser diode with a wavelength 1550nm has been used as a pump light source. Two types of chemical liquids used (N-Hexane, and Propanol). The detection limits of our device associated with the maximum shifts of the wavelength is 4.4 nm for N-Hexane vapor when the length of the head sensor 20mm. In this work, the maximum sensitivity obtained of volatile organic compounds is 15420 nm/mol at the vapor of N-Hexane.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jan 14 2021
Journal Name
مكتب نور الحسن للنشر والتوزيع
Practical Education and Field Application: A Methodological Vision"
...Show More Authors

Preview PDF
Publication Date
Sat Dec 17 2022
Journal Name
Applied Sciences
A Hybrid Artificial Intelligence Model for Detecting Keratoconus
...Show More Authors

Machine learning models have recently provided great promise in diagnosis of several ophthalmic disorders, including keratoconus (KCN). Keratoconus, a noninflammatory ectatic corneal disorder characterized by progressive cornea thinning, is challenging to detect as signs may be subtle. Several machine learning models have been proposed to detect KCN, however most of the models are supervised and thus require large well-annotated data. This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. We will evaluate the proposed models using corneal data collected from 5430 eyes at different stages of KCN severity (1520 healthy, 331 KCN1, 1319 KCN2, 1699 KCN3 a

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Apr 17 2023
Journal Name
Wireless Communications And Mobile Computing
A Double Clustering Approach for Color Image Segmentation
...Show More Authors

One of the significant stages in computer vision is image segmentation which is fundamental for different applications, for example, robot control and military target recognition, as well as image analysis of remote sensing applications. Studies have dealt with the process of improving the classification of all types of data, whether text or audio or images, one of the latest studies in which researchers have worked to build a simple, effective, and high-accuracy model capable of classifying emotions from speech data, while several studies dealt with improving textual grouping. In this study, we seek to improve the classification of image division using a novel approach depending on two methods used to segment the images. The first

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Improving IoT Applications Using a Proposed Routing Protocol
...Show More Authors

The main objective of this work is to propose a new routing protocol for wireless sensor network employed to serve IoT systems. The routing protocol has to adapt with different requirements in order to enhance the performance of IoT applications. The link quality, node depth and energy are used as metrics to make routing decisions. Comparison with other protocols is essential to show the improvements achieved by this work, thus protocols designed to serve the same purpose such as AODV, REL and LABILE are chosen to compare the proposed routing protocol with. To add integrative and holistic, some of important features are added and tested such as actuating and mobility. These features are greatly required by some of IoT applications and im

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Engineering
Studying Sustainable Concrete Block Efficiency Production: A Review
...Show More Authors

Worldwide, enormous amounts of waste cause major environmental issues, including scrap tires and plastic, and large waste, a consequence of the demolition of buildings, including crushed concrete, crushed clay bricks, and crushed thermo-stone. From that point, it’s possible to consider that the recycling processes for these materials and using them in the manufacturing field will reduce the adverse effects on the environment of these wastes and the consumption of natural resources. Sustainable concrete blocks can be considered as one of the products produced by using these materials as partial volume replacement of the coarse, fine aggregate, or cement content, considering their dry density, workability, absorption, co

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Al-khwarizmi Engineering Journal
Defect Detection Using Thermography Camera Techniques: A review
...Show More Authors

Individuals across different industries, including but not limited to agriculture, drones, pharmaceuticals and manufacturing, are increasingly using thermal cameras to achieve various safety and security goals. This widespread adoption is made possible by advancements in thermal imaging sensor technology. The current literature provides an in-depth exploration of thermography camera applications for detecting faults in sectors such as fire protection, manufacturing, aerospace, automotive, non-destructive testing and structural material industries. The current discussion builds on previous studies, emphasising the effectiveness of thermography cameras in distinguishing undetectable defects by the human eye. Various methods for defect

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed May 29 2019
Journal Name
Iraqi Journal Of Physics
A Spectroscopic and structural study of FeCoSb alloy
...Show More Authors

Fe, Co and Sb nanopowders were fruitfully prepared by electrical wire explosion method in Double distilled and de-ionized water (DDDW) media. The formation of iron, cobalt and antimony (FeCoSb) alloy nanopowder was monitored by X-ray diffraction. The x-ray diffraction pattern indicates that there are iron, cobalt and antimony peaks. Optical properties of this alloy nanoparticles were characterized by UV-Visible absorption spectra. The absorption peak position is shifted to the lower wavelengths when the current increases. That means the mean size of the nanoparticles controlled by changing the magnitude of the current. The surface morphological analysis is carried out by employing Scanning Electron Microscope (SEM). Particles with varies

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sun Jun 15 2025
Journal Name
الذكوات البيض
Drugs in Iraq 1932-1968 (A Historical Study)
...Show More Authors

The spread of drugs in Iraq during the period 1932-1968 was one of the most dangerous. phenomena affecting humans, as it leads to addiction, to the point where people cannot live without it, it also leads to the destruction of the user's nerves and body, and the inability to maintain balance, or even perform daily tasks. There are different types of drugs, and the side effects vary from one type to another However in all cases, drugs remain the scourge of the world, They are a toxic substance that attacks the nerves and tries to destroy them' The importance of the subject lies in the fact that it is anew and unstudied topic, and it studies a phenomenon that affects humanity in general and Iraq in Particular through it light can be shed on t

... Show More
View Publication
Publication Date
Sat Apr 01 2017
Journal Name
Al–bahith Al–a'alami
Quranic Words Referring to Lies A Media Study
...Show More Authors

This research aims to invest qur›anic words referring to lie in media language. The researcher has chosen a set of qur›anic words functioning as «lie».
It is an attempt to review the media language which is used to make use of repetition of terms and templated which make it weak and ineffective language. The use of qur›anic texts and terms according to the semantic field for each topic will give this media language an opportunity for growth, development and stability.
This researcher identifies a number of words to study them in the light of their lexical meaning using the Dictionary of Language Standards by Ibn Fares as it focuses on the general meaning of the root language. He also uses the Dictionary of the Basis of Rhe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jun 06 2024
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Lightweight Block and Stream Cipher Algorithm: A Review
...Show More Authors

Most of the Internet of Things (IoT), cell phones, and Radio Frequency Identification (RFID) applications need high speed in the execution and processing of data. this is done by reducing, system energy consumption, latency, throughput, and processing time. Thus, it will affect against security of such devices and may be attacked by malicious programs. Lightweight cryptographic algorithms are one of the most ideal methods Securing these IoT applications. Cryptography obfuscates and removes the ability to capture all key information patterns ensures that all data transfers occur Safe, accurate, verified, legal and undeniable.  Fortunately, various lightweight encryption algorithms could be used to increase defense against various at

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref