Preferred Language
Articles
/
1BemT5MBVTCNdQwCNdDB
Performance measurements of single server fuzzy queues with unreliable server using left and right method
...Show More Authors

The fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal's triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely developing an optimal solution (Opt. Sol.) depending on the corresponding path by the new tender algorithm.

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Dec 18 2017
Journal Name
Al-khwarizmi Engineering Journal
Experimental and Numerical Study of Collector Geometry Effect on Solar Chimney Performance
...Show More Authors

There have been many advances in the solar chimney power plant  since 1930 and the first pilot work was built in Spain (Manzanares) that produced 50 KW. The solar chimney power plant is considered of a clean power generation that needs to be investigated  to enhance the performance by studying the effect of changing the area of passage of air to enhance the velocity towards the chimney to maximize design velocity. In this experimental and numerical study, the reduction area of solar collector was investigated. The reduction area that mean changing the height of glass cover from the absorbing plate (h1=3.8cm, h2=2.6cm and h3=1.28cm). The numerical study was performed using ANSYS Fluent software package (version 14.0) to solve go

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Civil Engineering Journal
Marshall Performance and Volumetric Properties of Styrene-Butadiene-Styrene Modified Asphalt Mixtures
...Show More Authors

The durability of asphalt pavement is associated with the properties and performance of the binder. This work-study intended to understand the impact of blending Styrene-Butadiene-Styrene (SBS) to conventional asphalt concrete mixtures and calculating the Optimum Asphalt Content (OAC) for conventional mixture also; compare the performance between SBS modified with the conventional mixture. Two different kinds of asphalt penetration grades, A.C. (40-50) and A.C. (60-70), were improved with 2.5 and 3.5% SBS polymer, respectively. Marshall properties were determined in this work. Optimum Asphalt Content (OAC) was 4.93 and 5.1% by weight of mixture for A.C. (40-50) and (60-70), respectively. Marshall properties results show an increasem

... Show More
Scopus (10)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Thu Oct 01 2020
Journal Name
International Journal Of Interdisciplinary Telecommunications And Networking
Simulated Performance of TFRC, DCCP, SCTP, and UDP Protocols Over Wired Networks
...Show More Authors

Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were thro

... Show More
View Publication
Crossref (2)
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Wed Jun 25 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Cephalometric evaluation of a sample of Iraqi adults with normal occlusion using tetragon analysis
...Show More Authors

Background: This study aimed to determine the cephalometric values of tetragon analysis on a sample of Iraqi adults with normal occlusion. Material and methods: Forty digital true lateral cephalometric radiographs belong to 20 males and 20 females having normal dental relation were analyzed using AutoCAD program 2009. Descriptive statistics and sample comparison with Fastlicht norms were obtained. Results: The results showed that maxillary and mandibular incisors were more proclined and the maxillary/mandibular planes angle was lower in Iraqi sample than Caucasian sample. Conclusion: It's recommended to use result from this study when using tetragon analysis for Iraqis to get more accurate result.

View Publication Preview PDF
Publication Date
Sun Mar 07 2010
Journal Name
Baghdad Science Journal
Studying the ability of transformation of lymphocytes by using PHA in patient with Cytomegalovirus
...Show More Authors

Blood samples were collected from (31) pregnant women infected with cytomegalovirus , also (15) blood samples were collected from congenitally infected infants, and (20),(15),(15) blood samples were collected from pregnant women ,non pregnant and infants, respectively, all of them were as control groups. CMV infection identified by using ELISA assay to detect specific CMV IgM & IgG in sera. The results of lymphocyte transformation showed a significant decrease when phytoheamagglutinin (PHA) used as stimulator, lymphocytes response in infected pregnant women was lower than that of non infected pregnant women as well as non pregnant women. Result also showed a significant decrease in the ability of lymphocyte division in healthy pregnant w

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Using Some Estimation Methods for Mixed-Random Panel Data Regression Models with Serially Correlated Errors with Application
...Show More Authors

This research includes the study of dual data models with mixed random parameters, which contain two types of parameters, the first is random and the other is fixed. For the random parameter, it is obtained as a result of differences in the marginal tendencies of the cross sections, and for the fixed parameter, it is obtained as a result of differences in fixed limits, and random errors for each section. Accidental bearing the characteristic of heterogeneity of variance in addition to the presence of serial correlation of the first degree, and the main objective in this research is the use of efficient methods commensurate with the paired data in the case of small samples, and to achieve this goal, the feasible general least squa

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Assessment of Sustainable Urban Expansion with Land Use and Land Cover Changes for Al-Hillah City Using Remote Sensing and GIS Techniques
...Show More Authors

In the current study, remote sensing techniques and geographic information systems were used to detect changes in land use / land cover (LULC) in the city of Al Hillah, central Iraq for the period from 1990 - 2022. Landsat 5 TM and Landsat 8 OLI visualizations, correction and georeferencing of satellite visuals were used. And then make the necessary classifications to show the changes in LULC in the city of Al Hillah. Through the study, the results showed that there is a clear expansion in the urban area from 20.5 km2 in 1990 to about 57 km2 in 2022. On the other hand, the results showed that there is a slight increase in agricultural areas and water. While the arid (empty) area decreased from 168.7 km 2 to 122 km 2 in 2022. Long-term ur

... Show More
View Publication Preview PDF
Crossref (2)
Crossref