Preferred Language
Articles
/
9BeJbI4BVTCNdQwC9EcT
The use of Artificial Neural Network (ANN) for modeling of Cu (II) ion removal from aqueous solution by flotation and sorptive flotation process
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Adoption of multi – model Assignment Fuzzy to find Optimizing for the use of internet line in the Ministry of Science and Technlogy
...Show More Authors

We have provided in this research model multi assignment  with  fuzzy function goal has been to build programming model is correct Integer Programming fogging  after removing the case from the objective function data and convert it to real data .Pascal triangular graded mean using Pascal way to the center of the triangular.

The data processing to get rid of the case fogging which is surrounded by using an Excel 2007 either model multi assignment  has been used program LNDO to reach the optimal solution, which represents less than what can be from time to accomplish a number of tasks by the number of employees on the specific amount of the Internet, also included a search on some of the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Apr 01 2019
Journal Name
Materials Science In Semiconductor Processing
Synthesis and annealing process of ultra-large SnS nanosheets for FTO/SnS/CdS/Pt photocathode
...Show More Authors

SnS has been widely used in photoelectric devices due to its special band gap of 1.2-1.5 eV. Here, we reported on the fabrication of SnS nanosheets and the effect of synthesis condition together with heat treatment on its physical properties. The obtained band gap of the SnS nanosheets is in the rage of 1.37-1.41 eV. It was found that the photo-current density of a thin film comprised of SnS nanosheets could be enhanced significantly by annealing treatment. The maximum photo-current density of the stack structure of FTO/SnS/CdS/Pt was high as 389.5 mu A cm(-2), rendering its potential application in high efficiency solar hydrogen production.

View Publication
Scopus (10)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Wed Feb 01 2017
Journal Name
Physics Letters A
Wake potential of swift ion in amorphous carbon target
...Show More Authors

The wake potential and wake phenomena for swift proton in an amorphous carbon target were studied by utilising various dielectric function formalisms, including the Drude dielectric function, the Drude–Lorentz dielectric function and quantum dielectric function. The Drude model results exhibited a damped oscillatory behaviour in the longitudinal direction behind the projectile; the pattern of these oscillations decreases exponentially in the transverse direction. In addition, the wake potential extends slightly ahead of the projectile which also depends on the proton coordinate and velocity. The effect of electron binding on the wake potential, characterised by the ratio to 0.1, has been studied alongside the Drude–Lorentz dielectric

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Mar 31 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
INVESTIGATION OF BENTONITE CLAY SURFACE AS A PHYSICAL ANTIDOTE IN ADSORPTION OF AMITRIPTYLINE-HCl, CHLORPROMAZINE-HCl AND CHLORDIAZEPOXIDE-HCl FROM SOLUTION
...Show More Authors

A detailed study of adsorption from solution of amitriptyline-HCl, chlorpromazine-HCl and
chlordiazepoxide-HCl on bentonite clay surface has been performed at variable conditions of
temperature, pH and ionic strength. It is aimed in this work to explore the capability of this clay in
treatment of poisoning by the mentioned drugs if taken in quantities higher than the usual doses.
Quantities of drugs adsorbed have been determined by UV spectrophotometric technique. The
sequence of adsorption in neutral media at 37.5 CÙ’ followed the order:
Amitriptyline-HCl > chlorpromazine-HCl > chlordiazepoxide-HCl.
The results were discussed in the light of Langmuir and Freundich adsorption isotherms. The usual
basic th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 15 2020
Journal Name
Emerging Trends In Mechatronics
Interactional Modeling and Optimized PD Impedance Control Design for Robust Safe Fingertip Grasping
...Show More Authors

View Publication
Crossref
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Tue May 17 2022
Journal Name
Egyptian Journal Of Chemistry
Determination of Ferrous Ion in Pure & Pharmaceutical Preparation by Continuous Flow Injection Analysis Via Turbidmetric Utilizing NAG-4SX3-3D Analyzer
...Show More Authors

Scopus (3)
Scopus Clarivate Crossref
Publication Date
Sun Oct 05 2025
Journal Name
Mesopotamian Journal Of Computer Science
DGEN: A Dynamic Generative Encryption Network for Adaptive and Secure Image Processing
...Show More Authors

Cyber-attacks keep growing. Because of that, we need stronger ways to protect pictures. This paper talks about DGEN, a Dynamic Generative Encryption Network. It mixes Generative Adversarial Networks with a key system that can change with context. The method may potentially mean it can adjust itself when new threats appear, instead of a fixed lock like AES. It tries to block brute‑force, statistical tricks, or quantum attacks. The design adds randomness, uses learning, and makes keys that depend on each image. That should give very good security, some flexibility, and keep compute cost low. Tests still ran on several public image sets. Results show DGEN beats AES, chaos tricks, and other GAN ideas. Entropy reached 7.99 bits per pix

... Show More
View Publication
Scopus Crossref
Publication Date
Wed May 10 2017
Journal Name
Journal Of The College Of Languages (jcl)
РОЛЬ СРЕДСТВ НАГЛЯДНОСТИ В ПРОЦЕССЕ ОБУЧЕНИЯ РУССКОМУ ЯЗЫКУ КАК ИНОСТРАННОМУ В ИРАСКОЙ АУДИТОРИИ The Role of the Use of Visual Aids in the Process Of Learning Russian Language in Lraq as a Foreign Language
...Show More Authors

В статье рассматриваются понятие наглядности и ее классификация, эффективное применение принципа наглядности, возможность и преимущество использования наглядности и современные инструменты ее реализации в ираке.

 

Вследствие глобальных изменений во всем мире изменилась и роль иностранного языка в системе образования. Современный человек, шагающий в ногу со временем, не мыслит себя без зна

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref