Preferred Language
Articles
/
1BemT5MBVTCNdQwCNdDB
Performance measurements of single server fuzzy queues with unreliable server using left and right method
...Show More Authors

The fuzzy assignment models (FAMs) have been explored by various literature to access classical values, which are more precise in our real-life accomplishment. The novelty of this paper contributed positively to a unique application of pentagonal fuzzy numbers for the evaluation of FAMs. The new method namely Pascal's triangle graded mean (PT-GM) has presented a new algorithm in accessing the critical path to solve the assignment problems (AP) based on the fuzzy objective function of minimising total cost. The results obtained have been compared to the existing methods such as, the centroid formula (CF) and centroid formula integration (CFI). It has been demonstrated that operational efficiency of this conducted method is exquisitely developing an optimal solution (Opt. Sol.) depending on the corresponding path by the new tender algorithm.

Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jul 17 2025
Journal Name
Iraqi Journal Of Agricultural Sciences
STUDY THE EFFECTS OF SOME MECHANICAL FACTORS ON THE PERFORMANCE OF THE HAMMER MILL
...Show More Authors

View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Cogent Engineering
Influence of recycled concrete aggregate treatment methods on performance of sustainable warm mix asphalt
...Show More Authors

his study aimed to investigate the usability of Recycled Concrete Aggregate (RCA) in warm mix asphalt (WMA) as the implementation of sustainable construction technology. Five replacement rates (0%, 25%, 50%, 75%, and 100%) were tested for the coarse fraction of virgin aggregate (VA) with 3 types of RCA: untreated RCA, HL-treated RCA, and HCL-treated RCA. Scanning electron microscopy (SEM) analyses were performed to investigate the surface morphology for both treated and untreated RCA. The optimum asphalt cement content for every substitution rate was determined using Marshall mix design method. Thereafter, asphalt concrete specimens were prepared using the optimum asphalt cement content, followed by the evaluation of their performance prope

... Show More
View Publication
Crossref (17)
Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Performance of piled raft foundations under the effect of dewatering nearby an open pit
...Show More Authors
Abstract<p>The dewatering arrangement is required in execution works and it needs more attention due to the additional vertical settlement produced on the adjacent pile foundations. Raft foundations are being increasingly utilized for construction in cases of subsoil conditions with a high water table. Also, soil displacements in adjacent un-braced deep open pit may be a reason for high damages to the close buildings and foundations systems. The aim of this study is to examine the behaviour of piled raft foundations considering different pile locations under the effect of line drain and stage drilling of nearby open foundation pit. The line drain was used as dewatering process through the soil i</p> ... Show More
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Influences of Operating Variables on Hydrodynamic Performance of Plunging Water Jet Downflow Bubble Column
...Show More Authors

The hydrodynamics of a co-current down flow bubble column has been investigated with air – water system. A Perspex bubble column of 5cm in diameter and 1.5m height is used as a test contactor using nozzles of 7, 8 and 9 mm diameter for air-water distributing. The column is provided with three electro-resistivity needle probes for bubble detection.
Experimental work is carried out with air flow rates from 0.09 to 0.45 m3/hr and liquid flow rates from 0.65 to 1.1m3/hr in order to study the effects of superficial gas velocity, nozzle diameter and liquid flow rate on the characteristics of hydrodynamic interactions viz. gas hold up, bubble diameter and bubble velocity by using two technical methods, direct height measurements for air-wa

... Show More
View Publication Preview PDF
Publication Date
Sat Aug 01 2020
Journal Name
Journal Of Engineering
The Effect of Staggered porous fins on the performance of Photovoltaic panel in Baghdad
...Show More Authors

The performance of photovoltaic (PV) panel having staggered metal foam fins was examined experimentally in Baghdad, Iraq. Three staggered metal foam fin configurations attached to the backside of the PV panel were studied. The measured parameters were front and back surfaces temperature, open voltage and current circuits, maximum power, and PV efficiency. It was noted that the maximum electrical efficiency enhancement was 4.7% for staggered metal foam fins (case III) than the reference PV panel. The operating temperature of the cell was increased when the value of solar intensity was high. Thereby, the electrical efficiency was decreased. It was found that the metal foam fins decreased the PV temperature by 2-3 o

... Show More
View Publication Preview PDF
Crossref (12)
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Chemical Physics Letters
Effect of heat treatment on photoelectrochemical performance of hydrothermally synthesised Ag2S/ZnO nanorods arrays
...Show More Authors

View Publication
Scopus (22)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
Steganography in Audio Using Wavelet and DES
...Show More Authors

In this paper, method of steganography in Audio is introduced for hiding secret data in audio media file (WAV). Hiding in audio becomes a challenging discipline, since the Human Auditory System is extremely sensitive. The proposed method is to embed the secret text message in frequency domain of audio file. The proposed method contained two stages: the first embedding phase and the second extraction phase. In embedding phase the audio file transformed from time domain to frequency domain using 1-level linear wavelet decomposition technique and only high frequency is used for hiding secreted message. The text message encrypted using Data Encryption Standard (DES) algorithm. Finally; the Least Significant bit (LSB) algorithm used to hide secr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 07 2021
Journal Name
2021 14th International Conference On Developments In Esystems Engineering (dese)
Object Detection and Distance Measurement Using AI
...Show More Authors

View Publication
Scopus (26)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Voice Identification Using MFCC and Vector Quantization
...Show More Authors

The speaker identification is one of the fundamental problems in speech processing and voice modeling. The speaker identification applications include authentication in critical security systems and the accuracy of the selection. Large-scale voice recognition applications are a major challenge. Quick search in the speaker database requires fast, modern techniques and relies on artificial intelligence to achieve the desired results from the system. Many efforts are made to achieve this through the establishment of variable-based systems and the development of new methodologies for speaker identification. Speaker identification is the process of recognizing who is speaking using the characteristics extracted from the speech's waves like pi

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref