Preferred Language
Articles
/
0hf24ZIBVTCNdQwCYsKV
A review of free piston engine control literature—Taxonomy and techniques
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 19 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
New cost control techniques in mega construction projects
...Show More Authors

View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jan 30 2020
Journal Name
Al-kindy College Medical Journal
Thyroid Hemiagenesis with Ipsilateral Parathyroid Adenoma; Case report with Review of the Literature
...Show More Authors

Thyroid hemiagenesis (THA) is a rare congenital anomaly in which one lobe of thyroid gland fails to develop during embryological stage. Agenesis may be unilateral, total or isthmic. Left thyroid lobe is more commonly involved than right lobe in hemiagenesis. Agenesis of the isthmus was seen in 50% of cases. Left sided hemiagenesis is more common than right sided hemiagenesis with a Left to right ratio of 4:1. Clinically patients can be euthyroid, hypothyroid or hyperthyroid. Often it is diagnosed as an incidental finding during ultrasonography (USG) study of neck, which can easily diagnose this condition.

Actual incidence of THA is unknown; most cases are diagnosed in patients admitted for thyroid scan or thyroid surgery because

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Engineering
Application Artificial Forecasting Techniques in Cost Management (review)
...Show More Authors

For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions s

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Medium access control protocol design for wireless communications and networks review
...Show More Authors

<p><span>Medium access control (MAC) protocol design plays a crucial role to increase the performance of wireless communications and networks. The channel access mechanism is provided by MAC layer to share the medium by multiple stations. Different types of wireless networks have different design requirements such as throughput, delay, power consumption, fairness, reliability, and network density, therefore, MAC protocol for these networks must satisfy their requirements. In this work, we proposed two multiplexing methods for modern wireless networks: Massive multiple-input-multiple-output (MIMO) and power domain non-orthogonal multiple access (PD-NOMA). The first research method namely Massive MIMO uses a massive numbe

... Show More
Crossref (1)
Crossref
Publication Date
Mon Oct 02 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach: An Article Review
...Show More Authors

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr

... Show More
View Publication
Publication Date
Fri Oct 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Image Encryption Techniques Using Dynamic Approach : An Article Review
...Show More Authors

In this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to

In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2023
Journal Name
Environmental Nanotechnology, Monitoring & Management
A review study summarizes the main characterization techniques of nano-composite photocatalysts and their applications in photodegradation of organic pollutants
...Show More Authors

Scopus (57)
Crossref (18)
Scopus Crossref
Publication Date
Fri Nov 29 2024
Journal Name
Chemical Engineering Research And Design
Comprehensive review of severe slugging phenomena and innovative mitigation techniques in oil and gas systems
...Show More Authors

View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Dec 15 2021
Journal Name
Arab World English Journal
Aggressive Language in Literature: A Pragmatic Approach
...Show More Authors

Aggression is a negative form of an anti-social behavior. It is produced because of a particular reason, desire, want, need, or due to the psychological state of the aggressor. It injures others physically or psychologically. Aggressive behaviors in human interactions cause discomfort and disharmony among interlocutors. The paper aims to identify how aggressive language manifests itself in the data under scrutiny in terms of the pragmatic paradigm. Two British literary works are the data; namely, Look Back in Anger by John Osborne (1956), and The Birthday Party by Harold Pinter (1957). This paper endeavors to answer the question of how aggressive language is represented in literature pragmatically? It is hoped to be significant to

... Show More
View Publication Preview PDF
Crossref (1)
Clarivate Crossref
Publication Date
Tue Jul 11 2023
Journal Name
Journal Of Educational And Psychological Researches
International Studies Concerning Teachers’ Attitudes towards the Inclusion of Students with Special Educational Needs: Review of Literature
...Show More Authors

Over the years, the issue of inclusion of students with special educational needs (SEN) in mainstream schools is controversial worldwide. Evidence from research argues that without a positive teachers’ attitude towards the inclusion of students with SEN in mainstream schools, the successful implementation of inclusion is most likely doubtable. The aim of this paper is to understand teachers’ attitudes towards the inclusion of students with SEN in mainstream schools from different perspectives and from different contexts. The conclusion drawn in this review can be that teachers’ attitude is the most important key towards the appropriate inclusion implementation in mainstream schools. The disparity of teachers’ attitudes towards th

... Show More
View Publication Preview PDF