Preferred Language
Articles
/
5hcr8pEBVTCNdQwCtpwX
Cadmium removal using a spiral-wound woven wire meshes packed bed rotating cylinder electrode
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Tue Dec 07 2021
Journal Name
Tencon 2021 - 2021 Ieee Region 10 Conference (tencon)
Robust State Feedback Control of Electric Heating Furnace Using a New Disturbance Observer
...Show More Authors

As one type of heating furnaces, the electric heating furnace (EHF) typically suffers from time delay, non-linearity, time-varying parameters, system uncertainties, and harsh en-vironment of the furnace, which significantly deteriorate the temperature control process of the EHF system. In order to achieve accurate and robust temperature tracking performance, an integration of robust state feedback control (RSFC) and a novel sliding mode-based disturbance observer (SMDO) is proposed in this paper, where modeling errors and external disturbances are lumped as a lumped disturbance. To describe the characteristics of the EHF, by using convection laws, an integrated dynamic model is established and identified as an uncertain nonlinear second ord

... Show More
View Publication
Scopus (4)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Al-khwarizmi Engineering Journal
A Digital-Based Optimal AVR Design of Synchronous Generator Exciter Using LQR Technique
...Show More Authors

In this paper a new structure for the AVR of the power system exciter is proposed and designed using digital-based LQR. With two weighting matrices R and Q,  this method produces an optimal regulator that is used to generate the feedback control law. These matrices are called state and control weighting matrices and are used to balance between the relative importance of the input and the states in the cost function that is being optimized. A sample power system composed of single machine connected to an infinite- bus bar (SMIB) with both a conventional and a proposed Digital AVR (DAVR) is simulated. Evaluation results show that the DAVR damps well the oscillations of the terminal voltage and presents a faster respo

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Wed Feb 20 2019
Journal Name
Iraqi Journal Of Physics
Preparation of polyaniline polymer and using it as a Vapor sensor of acids
...Show More Authors

 Polyaniline organic Semiconductor polymer was prepared by oxidation polymerization by adding hydrochloric acid concentration of 0.1M and potassium per sulfate concentration of 0.2M to 0.1M of aniline at room temperature, the polymer was deposited at glass substrate, the structural and optical properties were studies through UV-VIS, IR, XRD measurements, films have been operated as a sensor of vapor  H2SO4 and HCl  acids.

View Publication Preview PDF
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
A Comparison between robust methods in canonical correlation by using empirical influence function
...Show More Authors

       Canonical correlation analysis is one of the common methods for analyzing data and know the relationship between two sets of variables under study, as it depends on the process of analyzing the variance matrix or the correlation matrix. Researchers resort to the use of many methods to estimate canonical correlation (CC); some are biased for outliers, and others are resistant to those values; in addition, there are standards that check the efficiency of estimation methods.

In our research, we dealt with robust estimation methods that depend on the correlation matrix in the analysis process to obtain a robust canonical correlation coefficient, which is the method of Biwe

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Feb 17 2019
Journal Name
Iraqi Journal Of Physics
A Study of the electronic structure of CdS Nanocrystals using density functional theory
...Show More Authors

Density Functional Theory at the generalized-gradient approximation level coupled with large unit cell method is used to simulate the electronic structure of (II-VI) zinc-blende cadmium sulfide nanocrystals that have dimensions 2-2.5 nm. The calculated properties include lattice constant, conduction and valence bands width, energy of the highest occupied orbital, energy of the lowest unoccupied orbital, energy gap, density of states etc. Results show that lattice constant and energy gap converge to definite values. However, highest occupied orbital, lowest unoccupied orbital fluctuates indefinitely depending on the shape of the nanocrystal.

View Publication Preview PDF
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (21)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Journal Of Mechanical Science And Technology
Optimization of a rectangular pin fin using elliptical perforations with different inclination angles
...Show More Authors

View Publication
Scopus (5)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Sep 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Emulsified Paraffine from Water: Effect of Bubble Size and Particle Size on Kinetic of Flotation
...Show More Authors

This paper  studied  kinetics  of flotation   of  emulsified  paraffine  in  water  in  bubble  column  with  sodium .dodecylsulphate as a collector agent. The effects of oil drops and air bubble diameters on the flotation rate constant were studied. The removal rate for each oil drop size was first order with respect to oil drop concentration. An experimental procedure permitting determination of the first order rate constants for  removal due to bubble/drop interaction was developed, decreasing bubble diameter by adding NaCl and increasing oil drop diameter increased the rate constants. A comparison between the experimental and theoretical rate constants showed

... Show More
View Publication Preview PDF