Preferred Language
Articles
/
7xcdPo8BVTCNdQwCNmRQ
Study the Radial Expansion of SN 1987A Using Counting Pixels Method
...Show More Authors

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Sep 04 2016
Journal Name
Baghdad Science Journal
Study of the Immunological Status of Iraqi Vitiligo Patients
...Show More Authors

Vitiligo is an acquired idiopathic skin disorder characterized by depigmented macules due to loss of cutaneous melanocytes. A potential role of the immune dysfunction has been suggested in vitiligo, so to test this hypothesis, certain cytokines (IL-17A and TNF-?) and immunoglobulins (IgM, IgG, IgA and total IgE) were investigated in all participants. The study included: 60 patients with age range between (6-55) year; 30(11 males and 19 females) were untreated and 30(12 males and 18 females) were treated with Narrow Band Ultraviolet-B (NB-UVB) and 30 (14 males and 16 females) apparently healthy control. Serum was separated and cytokines (IL-17A and TNF-?) and total immunoglobulin E (IgE) were detected by using Enzyme Linked Immunosorbent Ass

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Tue Dec 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Study of the Performance of Batch Reactive Distillation Column
...Show More Authors

Batch reactive distillation was studied in packed bed column. Esterification of methanol with acetic acid to produce methyl acetate and water with homogenous sulfuric acid as a catalyst was considered. This system was chosen because the reaction is reversible and the boiling point of reactant and products are different.
The reaction was carried out with and without distillation column and shows that the reactive distillation is more efficient from the conventional process (reactor and then separation). The conversion of acetic acid and concentration of methyl acetate increase by (30.43% and 75.14%) respectively at the best condition (reflux ratio 2, feed mole ratio 2 and batch time 90 minute).
The influence of various parameters, s

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Petroleum Research And Studies
Stress Ratio Method to Predict Fracture Pressure Gradient in Southern Iraqi Deep Wells
...Show More Authors

This research presents a method for calculating stress ratio to predict fracture pressure gradient. It also, describes a correlation and list ideas about this correlation. Using the data collected from four wells, which are the deepest in southern Iraqi oil fields (3000 to 6000) m and belonged to four oil fields. These wells are passing through the following formations: Y, Su, G, N, Sa, Al, M, Ad, and B. A correlation method was applied to calculate fracture pressure gradient immediately in terms of both overburden and pore pressure gradient with an accurate results. Based on the results of our previous research , the data were used to calculate and plot the effective stresses. Many equations relating horizontal effective stress and vertica

... Show More
Publication Date
Mon Dec 21 2020
Journal Name
2020 Emerging Technology In Computing, Communication And Electronics (etcce)
An Integrated Grey Wolf Optimizer with Nelder-Mead Method for Workflow Scheduling Problem
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Carbon Nanotubes: Synthesis via Flame Fragment Deposition (FFD) Method from Liquefied Petroleum Gas
...Show More Authors

The current study uses the flame fragment deposition (FFD) method to synthesize carbon nanotubes (CNTs) from Iraqi liquefied petroleum gas (LPG), which is used as a carbon source. To carry out the synthesis steps, a homemade reactor was used. To eliminate amorphous impurities, the CNTs were sonicated in a 30 percent hydrogen peroxide (H2O2) solution at ambient temperature. To remove the polycyclic aromatic hydrocarbons (PAHs) generated during LPG combustion, sonication in an acetone bath is used. The produced products were investigated and compared with standard Multi-walled carbon nanotube MWCNTs (95%), Sigma, Aldrich, using X-ray diffraction (XRD), thermo gravimetric analysis (TGA), Raman spectroscopy, scanning el

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Accurate Four-Step Hybrid Block Method for Solving Higher-Order Initial Value Problems
...Show More Authors

This paper focuses on developing a self-starting numerical approach that can be used for direct integration of higher-order initial value problems of Ordinary Differential Equations. The method is derived from power series approximation with the resulting equations discretized at the selected grid and off-grid points. The method is applied in a block-by-block approach as a numerical integrator of higher-order initial value problems. The basic properties of the block method are investigated to authenticate its performance and then implemented with some tested experiments to validate the accuracy and convergence of the method.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref