Preferred Language
Articles
/
2BayiIkBVTCNdQwCs4pV
A comprehensive review on modelling the adsorption process for heavy metal removal from waste water using artificial neural network technique
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 27 2019
Journal Name
Civil Engineering Journal
Prediction of Sediment Accumulation Model for Trunk Sewer Using Multiple Linear Regression and Neural Network Techniques
...Show More Authors

Sewer sediment deposition is an important aspect as it relates to several operational and environmental problems. It concerns municipalities as it affects the sewer system and contributes to sewer failure which has a catastrophic effect if happened in trunks or interceptors. Sewer rehabilitation is a costly process and complex in terms of choosing the method of rehabilitation and individual sewers to be rehabilitated.  For such a complex process, inspection techniques assist in the decision-making process; though, it may add to the total expenditure of the project as it requires special tools and trained personnel. For developing countries, Inspection could prohibit the rehabilitation proceeds. In this study, the researchers propos

... Show More
View Publication
Scopus (18)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (15)
Crossref (8)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
A Review of the Stereo lithography 3D Printing Process and the Effect of Parameters on Quality
...Show More Authors

Stereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA type b

... Show More
View Publication Preview PDF
Scopus (19)
Crossref (18)
Scopus Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Al-khwarizmi Engineering Journal
A Review of the Stereo lithography 3D Printing Process and the Effect of Parameters on Quality
...Show More Authors

Stereo lithography (SLA) three-dimensional (3D) printing process is a type of additive manufacturing techniques that uses digital models from computer-aided design to automatically produce customized 3D objects. Around 30 years, it has been widely utilized in the manufacturing, design, engineering, industrial sectors and its applications in dentistry for manufacturing prosthodontics are very important. The stereo lithography technology is highly regarded because it can produce items with excellent precision especially when selecting the best process parameters. This review article offers a useful and scientific summary of SLA three-dimensional printing technology and its brief history. The specific type of 3D printers which is SLA t

... Show More
Scopus (19)
Crossref (18)
Scopus Crossref
Publication Date
Mon Mar 06 2023
Journal Name
Environmental Monitoring And Assessment
Copper metal elimination from polluted soil by electro-kinetic technique
...Show More Authors

View Publication
Scopus (7)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Wed Dec 12 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
The performance of MnO<sub>2</sub>/graphite electrode for TOC removal from wastewater by indirect electrochemical oxidation process
...Show More Authors

Electrochemical oxidation in the presence of sodium chloride used for removal of phenol and any other organic by products formed during the electrolysis by using MnO2/graphite electrode. The performance of the electrode was evaluated in terms fraction of phenol and the formed organic by products removed during the electrolysis process. The results showed that the electrochemical oxidation process was very effective in the removal of phenol and the other organics, where the removal percentage of phenol was 97.33%, and the final value of TOC was 6.985 ppm after 4 hours and by using a speed of rotation of the MnO2 electrode equal to 200 rpm.

View Publication Preview PDF
Scopus (6)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jul 18 2022
Journal Name
Ieee Access
Moderately Multispike Return Neural Network for SDN Accurate Traffic Awareness in Effective 5G Network Slicing
...Show More Authors

Due to the huge variety of 5G services, Network slicing is promising mechanism for dividing the physical network resources in to multiple logical network slices according to the requirements of each user. Highly accurate and fast traffic classification algorithm is required to ensure better Quality of Service (QoS) and effective network slicing. Fine-grained resource allocation can be realized by Software Defined Networking (SDN) with centralized controlling of network resources. However, the relevant research activities have concentrated on the deep learning systems which consume enormous computation and storage requirements of SDN controller that results in limitations of speed and accuracy of traffic classification mechanism. To fill thi

... Show More
Scopus (13)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Automatic Identification of Ear Patterns Based on Convolutional Neural Network
...Show More Authors

Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in

... Show More
View Publication
Scopus Crossref