Preferred Language
Articles
/
ijp-930
Influence of Gold Concentration on the Main Detection Parameters of Ge-Au Photoconductive Detector
...Show More Authors

Ge-Au infrared photoconductive detection was prepared from germanium single crystal which were doped with different gold concentration using thermal evaporation. The spectral resonsivity (Rλ), spectral detectivity (D*) were determined as function of wavelength, also the resistance, conductivity in dark and with illumination to infrared radiation, the gain and relative photo response have been measured with different gold concentration. Remarkable improvements in the photoresponse gain were observed for the highest resistance specimen at the expense of spectral detectivity values.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 30 2021
Journal Name
Al-kindy College Medical Journal
The Role of MRI-US Fusion Techniques in Detection of Clinically Significant Prostate Cancer
...Show More Authors

Prostate cancer is the commonest male cancer and the second leading cause of cancer-related death in men. Over many decades, prostate cancer detection represented a continuous challenge to urologists. Although all urologists and pathologists agree that tissue diagnosis is essential especially before commencing active surgical or radiation treatment, the best way to obtain the biopsy was always the big hurdle. The heterogenicity of the tumor pathology is very well seen in its radiological appearance. Ultrasound has been proven to be of limited sensitivity and specificity in detecting prostate cancer. However, it was the only available targeting technique for years and was used to guide biopsy needle passed transrectally or transperineally

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Laser Micro- And Nano-scale Processing
Effective working parameters of laser micro-/nano-machining
...Show More Authors

Modern emerged technologies impose development and fabrication of miniatur-ized parts and devices in the micro- and nano-scale. Producing micro- and nano-featured structures requires nonconventional machining processes where con-ventional machining processes such as grinding, milling and eroding have failed. New emerging processes, such laser machining processes, are still fraught with almost invincible processes. Micro-/nano-machining are the pro-cesses of producing parts, microsystems or features at a scale of a few microm-eters and less than one hundred nanometers, respectively. Precise cutting and clean material removal accompanied with a negligible heat affected zone (HAZ), which are usually the characteristics of laser ablation, have

... Show More
View Publication
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Investigation of Effecting Parameters in a Turning Operation
...Show More Authors

        In this study multi objective optimization is utilized to optimize a turning operation to reveal the appropriate level of process features. The goal of this work is to evaluate the optimal combination of cutting parameters like feed, spindle speed, inclination angle and workpiece material to have a best surface quality Taguchi technique L9 mixed orthogonal array, has been adopted to optimize the roughness of surface. Three rods of length around (200 mm) for the three metals are used for this work. Each rod is divided into three parts with 50 mm length. For brass the optimum parametric mix for minimum Ra is A1, B1 and C3, i.e., at tool inclination angle (5), feedrate of 0.01, spindle speed of 120

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Oct 01 2010
Journal Name
Iraqi Journal Of Physics
Correlation of Paschen parameters in magnetized argon plasma
...Show More Authors

A number of glow discharge experiments has been carried out in a relatively large-volume metallic vacuum chamber containing argon at low pressure and immersed in an inhomogeneous magnetic field generated by a solenoidal coil capable of delivering 2100G. Two Paschen curves demonstrating the dependence of the discharge voltage on sparking parameter Pd and magnetic field strength B were deduced. A graphical correlation showing the behaviour of the voltage difference from the two curves on the ratio B/Pd was constructed. Investigations showed a reduction in the nominal impedance of the discharge device of nearly 20% when B reaches a value of 525G. Plasma confinement regions were found around the internal surface of the chamber at the entranc

... Show More
View Publication Preview PDF
Publication Date
Tue Dec 26 2017
Journal Name
Al-khwarizmi Engineering Journal
Optimization of Wear Parameters in AISI 4340 Steel
...Show More Authors

Abstract

 This study investigated the optimization of wear behavior of AISI 4340 steel based on the Taguchi method under various testing conditions. In this paper, a neural network and the Taguchi design method have been implemented for minimizing the wear rate in 4340 steel. A back-propagation neural network (BPNN) was developed to predict the wear rate. In the development of a predictive model, wear parameters like sliding speed, applying load and sliding distance were considered as the input model variables of the AISI 4340 steel. An analysis of variance (ANOVA) was used to determine the significant parameter affecting the wear rate. Finally, the Taguchi approach was applied to determine

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref