Preferred Language
Articles
/
2BayiIkBVTCNdQwCs4pV
A comprehensive review on modelling the adsorption process for heavy metal removal from waste water using artificial neural network technique
...Show More Authors

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Modified Elman Spike Neural Network for Identification and Control of Dynamic System
...Show More Authors

View Publication
Scopus (20)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Mar 19 2015
Journal Name
Al-academy
Transformations in The Process of Mass Communication Using the International Network of Information (Internet): انتصار رسمي موسى
...Show More Authors

Summarized the idea of research is marked by "changes in the process of mass communication by using the international network of information" by specifying what data networking and mass communication is the transformation processes in the mass communication network where research aims to:1. Diagnostic data and transformations in the process of mass communication network.2. Provide a contact form commensurate with the characteristic mass of the International Network of electronic information, and research found to provide a communicative model called the (human contact network). In short (HCN) Humanity Communication Net also reached conclusions concerning the search process and communicative transformations and changes that have taken pla

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 14 2021
Journal Name
Iraqi Journal Of Science
Unified Modelling Language (UML) Effect on the Total Cost of Ownership (TCO) for a Software Development
...Show More Authors

UML (Unfiled Modeling Language), known as the standard method for object-oriented (analysis and design) modeling, includes other languages which enables it to implement a prototype of the structure and behaviors of the product. This paper attempts to explore the observations about UML role on the cost of software maintenance, and hence on the Total Cost of Ownership (TCO) of a software product. It is therefore important to investigate the benefits obtained through modeling..

View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Global Pharma Technology
Using tobacco leaves as adsorbent for the orange-g dye removal from its aqueous solutions
...Show More Authors

The removal of commercial orange G dye from its aqueous solution by adsorption on tobacco leaves (TL) was studied in respect to different factor that affected the adsorption process. These factors including the tobacco leaves does, period of orange G adsorption, pH, and initial orange G dye concentration .Different types of isotherm models were used to describe the orange G dye adsorption onto the tobacco leaves. The experimental results were compared using Langmuir, and frundlich adsorption isotherm, the constants for these two isotherm models was determined. The results fitted frundlich model with value of correlation coefficient equal to (0.981). The capacity of adsorption for the orange G dye was carried out using various kinetic models

... Show More
Scopus (5)
Scopus
Publication Date
Sat Jul 28 2018
Journal Name
Journal Of Engineering
Experimental Investigation for the Removal of Toxic Gases from Vehicle Exhaust using Non-Thermal Plasma
...Show More Authors

In this study, the use of non-thermal plasma theory to remove toxic gases emitted from a vehicle was experimentally investigated. A non-thermal plasma reactor was constructed in the form of a cylindrical tube made of Pyrex glass. Two stainless steel rods were placed inside the tube to generate electric discharge and plasma condition, by connecting with a high voltage power supply (up to 40 kV). The reactor was used to remove the contaminants of a 1.25-liter 4-cylinder engine at ambient conditions. Several tests have been carried out for a ranging speed from 750 to 4,500 rpm of the engine and varying voltages from 0 to 32 kV. The gases entering the reactor were examined by a gas analyzer and the gases concentration ratio

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Journal Of Engineering
Adsorption of Mefenamic Acid From Water by Bentonite Poly urea formaldehyde Composite Adsorbent
...Show More Authors

Poly urea formaldehyde –Bentonite (PUF-Bentonite) composite was tested as new adsorbent
for removal of mefenamic acid (MA) from simulated wastewater in batch adsorption
procedure. Developed a method for preparing poly urea formaldehyde gel in basic media by
using condensation polymerization. Adsorption experiments were carried out as a function of
water pH, temperature, contact time, adsorbent dose and initial MA concentration .Effect of
sharing surface with other analgesic pharmaceuticals at different pH also studied. The
adsorption of MA was found to be strongly dependent to pH. The Freundlich isotherm model
showed a good fit to the equilibrium adsorption data. From Dubinin–Radushkevich model the
mean free

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
An Artificial Intelligence-based Proactive Network Forensic Framework
...Show More Authors

     is at an all-time high in the modern period, and the majority of the population uses the Internet for all types of communication. It is great to be able to improvise like this. As a result of this trend, hackers have become increasingly focused on attacking the system/network in numerous ways. When a hacker commits a digital crime, it is examined in a reactive manner, which aids in the identification of the perpetrators. However, in the modern period, it is not expected to wait for an attack to occur. The user anticipates being able to predict a cyberattack before it causes damage to the system. This can be accomplished with the assistance of the proactive forensic framework presented in this study. The proposed system combines

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Tue Oct 25 2022
Journal Name
Minar Congress 6
HANDWRITTEN DIGITS CLASSIFICATION BASED ON DISCRETE WAVELET TRANSFORM AND SPIKE NEURAL NETWORK
...Show More Authors

In this paper, a handwritten digit classification system is proposed based on the Discrete Wavelet Transform and Spike Neural Network. The system consists of three stages. The first stage is for preprocessing the data and the second stage is for feature extraction, which is based on Discrete Wavelet Transform (DWT). The third stage is for classification and is based on a Spiking Neural Network (SNN). To evaluate the system, two standard databases are used: the MADBase database and the MNIST database. The proposed system achieved a high classification accuracy rate with 99.1% for the MADBase database and 99.9% for the MNIST database

View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Arabic Speech Classification Method Based on Padding and Deep Learning Neural Network
...Show More Authors

Deep learning convolution neural network has been widely used to recognize or classify voice. Various techniques have been used together with convolution neural network to prepare voice data before the training process in developing the classification model. However, not all model can produce good classification accuracy as there are many types of voice or speech. Classification of Arabic alphabet pronunciation is a one of the types of voice and accurate pronunciation is required in the learning of the Qur’an reading. Thus, the technique to process the pronunciation and training of the processed data requires specific approach. To overcome this issue, a method based on padding and deep learning convolution neural network is proposed to

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Text Encryption Algorithm Based on Chaotic Neural Network and Random Key Generator
...Show More Authors

This work presents a symmetric cryptography coupled with Chaotic NN , the encryption algorithm process the data as a blocks and it consists of multilevel( coding of character, generates array of keys (weights),coding of text and chaotic NN ) , also the decryption process consists of multilevel (generates array of keys (weights),chaotic NN, decoding of text and decoding of character).Chaotic neural network is used as a part of the proposed system with modifying on it ,the keys that are used in chaotic sequence are formed by proposed key generation algorithm .The proposed algorithm appears efficiency during the execution time where it can encryption and decryption long messages by short time and small memory (chaotic NN offer capacity of m

... Show More
View Publication Preview PDF