Preferred Language
Articles
/
ijp-341
Enhancement of gas response of annealed ZnO film for hydrogen gas detection
...Show More Authors

  The mechanism of hydrogen (H2) gas sensor in the range of 50-200 ppm of RF-sputtered annealed zinc oxide (ZnO) and without annealing was studied. The X-ray Diffraction( XRD) results showed that the Zn metal was completely converted to ZnO with a polycrystalline structure. The I–V characteristics of the device (PT/ZnO/Pt) measured at room temperature before and after annealing at 450 oC for4h, from which a linear relationship has been observed. The sensors had a maximum response to H2 at 350 oC for annealing ZnO and showed stable behavior for detecting H2 gases in the range of 50 to 200 ppm. The annealed film exhibited higher response than the film without annealing.. The sensing mechanism was modeled according to the oxygen–vacancy model.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Journal Of Engineering
Experimental Investigation of Heat Transfer Enhancement in a Double Pipe Heat Exchanger Using Compound Technique of Transverse Vibration and Inclination Angle
...Show More Authors

Numerous tests are recently conducted to assess vibration's role in accelerating the heat transfer rate in various heat exchangers. In this work, the enhancement of heat transfer by the effect of transfer vibration and inclination angles on the surface of a double pipe heat exchanger experimentally has been investigated. A data acquisition system is applied to record the data of temperatures, flow rates, and frequencies over the tests. A compound technique was adopted, including the application of a set of inclination angles of (0°, 10°, 20°, and 30°) under the effect of frequency of vibration ranging from sub-resonance to over-resonance frequencies. The results showed that the overall heat transfer coefficient enhan

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Tue Jun 20 2023
Journal Name
Baghdad Science Journal
Enhancement of corrosion protection of metal carbon steel C45 and stainless steel 316 by using inhibitor (Schiff base) in sea water
...Show More Authors

This research has presented a solution to the problem faced by alloys: the corrosion problem, by reducing corrosion and enhancing protection by using an inhibitor (Schiff base). The inhibitor (Schiff base) was synthesized by reacting of the substrates materials (4-dimethylaminobenzaldehyde and 4-aminoantipyrine). It was diagnosed by infrared technology IR, where the IR spectrum and through the visible beams proved that the Schiff base was well formed and with high purity. The corrosion behavior of carbon steel and stainless steel in a saline medium (artificial seawater 3.5%NaCl) before and after using the inhibitor at four temperatures: 20, 30, 40, and 50 C° was studied by using three electrodes potentiostat. The corrosion behavior

... Show More
View Publication
Scopus (16)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Engineering Applications Of Computational Fluid Mechanics
Comprehensive analysis of melting enhancement by circular Y-shaped fins in a vertical shell-and-tube heat storage system
...Show More Authors

View Publication
Scopus (45)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Biochemical & Cellular Archives
STUDY ON ABILITY OF PROTEUS MIRABILIS ISOLATED FROM BURNS AND WOUNDS INFECTIONS TO BIOFILM FORMATION AND DETECTION URE C GENE RESPONSIBLE FOR PRODUCE UREASE ENZYME
...Show More Authors

A total of 200 clinical samples included Burns and Wounds infections were collected from Baghdad Governorate. Results showed that rate all isolates of P. mirabilis was 31(15.5%) and rate of Burns infections was 14 (45%) and rate of wounds infection 17 (55%). Where was diagnostic based on conventional biochemical tests and confirmed by the Vitek-2 Compact system and the specific primer of the16SrRNA gene, the ability of bacterial isolates to biofilm formation to be studied. It's considered an important virulence factor in Incidence of diseases and play important role in increasing resistance to antibiotic of encased bacteria, by two methods Congo Red Agar method and Microtiter Plate method. The Congo Red Agar method showed that most isolates

... Show More
Scopus
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Development of Iraqi License Plate Recognition System based on Canny Edge Detection Method
...Show More Authors

In recent years, there has been expanding development in the vehicular part and the number of vehicles moving on the road in all the sections of the country. Vehicle number plate identification based on image processing is a dynamic area of this work; this technique is used for security purposes such as tracking of stolen cars and access control to restricted areas. The License Plate Recognition System (LPRS) exploits a digital camera to capture vehicle plate numbers is used as input to the proposed recognition system. Basically, the developing system is consist of three phases, vehicle license plate localization, character segmentation, and character recognition, the License Plate (LP) detection is presented using canny

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computer Networks, Big Data And Iot
A Comprehensive Study of Various DC Faults and Detection Methods in Photovoltaic System
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Iraqi Journal Of Science
Land cover change detection of Baghdad city using multi-spectral remote sensing imagery
...Show More Authors

Publication Date
Mon Jun 01 2020
Journal Name
Annals Of Tropical Medicine And Public Health
Molecular Detection of High-Risk Human Papillomavirus Genotypes from Cervical Lesions in Baghdad
...Show More Authors

Objective Using two complementary techniques of virus detection human papillomavirus (HPV)[capture of hybrids (CH) and polymerase chain reaction (PCR)], relate the cytological study and/or cervical biopsy with high-risk HPV (HPV-HR) genotypes presence, as well as relating their viral load (VL). Methods About 272 women, who presented most cell alterations compatible with lesions cervical HPV, which has been detected in all high risk by the CH method and HPV genotype detection by PCR. Results In 22% of the patients it was not detected HPV DNA. Genotype 16 and/or 18 was prevalent and was found in 33% of the 212 women studied, meanwhile, mixed infections were found by several genotypes in 25%. In as for the histological lesions found, in 61 pat

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication