Preferred Language
Articles
/
ijp-56
Enhancement the sensitivity of humidity sensor based on an agarose infiltration reflection-type photonic crystal fiber interferometer
...Show More Authors

Photonic Crystal Fiber Interferometers (PCFIs) are widely used for sensing applications. This work presents the fabrication and study the characterization of a relative humidity sensor based on a polymer-infiltrated photonic crystal fiber that operates in a Mach- Zehnder Interferometer (MZI) reflection mode. The fabrication of the sensor only involves splicing and cleaving Photonic Crystal Fiber (PCF) with Single Mode Fiber (SMF). A stub of (LMA-10) PCF spliced to SMF (Corning-28). In the splice regions. The PCFI sensor operation based on the adsorption and desorption of water vapour at the silica-air interface within the PCF. The sensor shows a high sensitivity to RH variations from (27% RH - 95% RH), with a change in its reflected power and the position of the interference peaks is found to be shifted that the interference pattern with a 100 nm span can be observed with high humidity sensitivity of (8.49 pm / %RH) is achieved with compact (4mm) PCF length . The sensor has the advantages for suitable for monitoring humidity in microenvironments. The repeatability, long-term stability, measurement accuracy. Wide humidity range. The response time of the sensor is found to be 1.4 sec for a change in RH of 50 %RH. The fast response time suggests that the sensor can potentially be used as a human breath rate monitor in a clinical situation.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet atta</p> ... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Estimation of Parameters for the Gumbel Type-I Distribution under Type-II Censoring Scheme
...Show More Authors

This paper aims to decide the best parameter estimation methods for the parameters of the Gumbel type-I distribution under the type-II censorship scheme. For this purpose, classical and Bayesian parameter estimation procedures are considered. The maximum likelihood estimators are used for the classical parameter estimation procedure. The asymptotic distributions of these estimators are also derived. It is not possible to obtain explicit solutions of Bayesian estimators. Therefore, Markov Chain Monte Carlo, and Lindley techniques are taken into account to estimate the unknown parameters. In Bayesian analysis, it is very important to determine an appropriate combination of a prior distribution and a loss function. Therefore, two different

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Recent Research On Geotechnical Engineering, Remote Sensing, Geophysics And Earthquake Seismology
Evaluating the Accuracy of iPhone Lidar Sensor for Building Façades Conservation
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
On Estimation of the Stress – Strength Reliability Based on Lomax Distribution
...Show More Authors
Abstract<p>The present paper concerns with the problem of estimating the reliability system in the stress – strength model under the consideration non identical and independent of stress and strength and follows Lomax Distribution. Various shrinkage estimation methods were employed in this context depend on Maximum likelihood, Moment Method and shrinkage weight factors based on Monte Carlo Simulation. Comparisons among the suggested estimation methods have been made using the mean absolute percentage error criteria depend on MATLAB program.</p>
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Sensors And Actuators B: Chemical
Sensor and sensor microtiterplate with expanded pH detection range and their use in real samples
...Show More Authors

View Publication
Scopus (12)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2009
Journal Name
Iraqi Journal Of Physics
Crystal Growth of Semiconductor CuAl0.4Ti0.6Se2 and studding the Structural Properties of its Alloy and Thin Film
...Show More Authors

Tetragonal compound CuAl0.4Ti0.6Se2 semiconductor has been prepared by
melting the elementary elements of high purity in evacuated quartz tube under low
pressure 10-2 mbar and temperature 1100 oC about 24 hr. Single crystal has been
growth from this compound using slowly cooled average between (1-2) C/hr , also
thin films have been prepared using thermal evaporation technique and vacuum 10-6
mbar at room temperature .The structural properties have been studied for the powder
of compound of CuAl0.4Ti0.6Se2u using X-ray diffraction (XRD) . The structure of the
compound showed chalcopyrite structure with unite cell of right tetragonal and
dimensions of a=11.1776 Ao ,c=5.5888 Ao .The structure of thin films showed

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Study the use of Nano-limestone and Egg-shell Ash in Eco-friendly SCC: an Experimental and Statistical Evaluation Based on Computer Programming
...Show More Authors

View Publication
Scopus (17)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
An open cloud-based platform for the creation and delivery of smart applications and services
...Show More Authors
Abstract<p>With the increasing integration of computers and smartphones into our daily lives, in addition to the numerous benefits it offers over traditional paper-based methods of conducting affairs, it has become necessary to incorporate one of the most essential facilities into this integration; namely: colleges. The traditional approach for conducting affairs in colleges is mostly paper-based, which only increases time and workload and is relatively decentralized. This project provides educational and management services for the university environment, targeting the staff, the student body, and the lecturers, on two of the most used platforms: smartphones and reliable web applications by clo</p> ... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
An Efficient Shrinkage Estimators For Generalized Inverse Rayleigh Distribution Based On Bounded And Series Stress-Strength Models
...Show More Authors
Abstract<p>In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.</p>
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach
...Show More Authors

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Crossref