Preferred Language
Articles
/
ARgNx5QBVTCNdQwCiSCl
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Nov 01 2022
Journal Name
Environmental Research
Can electrocoagulation technology be integrated with wastewater treatment systems to improve treatment efficiency?
...Show More Authors

Considerable amounts of domestic and industrial wastewater that should be treated before reuse are discharged into the environment annually. Electrocoagulation is an electrochemical technology in which electrical current is conducted through electrodes, it is mainly used to remove several types of wastewater pollutants, such as dyes, toxic materials, oil content, chemical oxygen demand, and salinity, individually or in combination with other processes. Electrocoagulation technology used in hybrid systems along with other technologies for wastewater treatment are reviewed in this work, and the articles reviewed herein were published from 2018 to 2021. Electrocoagulation is widely employed in integrated systems with other electrochemical tech

... Show More
View Publication
Scopus (84)
Crossref (79)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Environmental Research
Can electrocoagulation technology be integrated with wastewater treatment systems to improve treatment efficiency?
...Show More Authors

View Publication
Scopus (86)
Crossref (81)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Object Dimension and Location Determination in Gantry Robots and Conveyor Systems: A Review
...Show More Authors

A​‍​‌‍​‍‌ gantry robot is one of the most common types of industrial robots with linear movement. This type of robot is also known as a Cartesian or linear robot. It is an automated industrial system that moves along linear paths, enabling it to create a 3D envelope of the space in which it operates. A robot of this type has a standardised configuration process because it can have several sets of axes, such as X, Y and Z. The gantry robot picks up products from several places, so it can search through various locations. Afterwards, it carefully deposits the products on a conveyor belt for the next stage of the procedure or final ​‍​‌‍​‍‌shipment. This integration enables continuous and automated material flow

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Compare between result of analysis of variance after and before use analysis covariance to Split-blocks design
...Show More Authors

This research aims to study the important of the effect of analysis of covariance manner for one of important of design for multifactor experiments, which called split-blocks experiments design (SBED) to deal the problem of extended measurements for a covariate variable or independent variable (X) with data of response variable or dependent variable Y in agricultural experiments that contribute to mislead the result when analyze data of Y only. Although analysis of covariance with discussed in experiments with common deign, but it is not found information that it is discussed with split-Blocks experiments design (SBED) to get rid of the impact a covariance variable. As part application actual field experiment conducted, begun at

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Nov 02 2023
Journal Name
Journal Of Engineering
Verification and Parametric Analysis of Shear Behavior of Reinforced Concrete Beams using Non-linear Finite Element Analysis
...Show More Authors

Many researchers have tackled the shear behavior of Reinforced Concrete (RC) beams by using different kinds of strengthening in the shear regions and steel fibers. In the current paper, the effect of multiple parameters, such as using one percentage of Steel Fibers (SF) with and without stirrups, without stirrups and steel fibers, on the shear behavior of RC beams, has been studied and compared by using Finite Element analysis (FE). Three-dimensional (3D) models of (RC) beams are developed and analyzed using ABAQUS commercial software. The models were validated by comparing their results with the experimental test. The total number of beams that were modeled for validation purposes was four. Extensive pa

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 01 2017
Journal Name
Journal Of Education And Scientific Studies -chem.dep.
Preparation of Activated carbon of the dry corn and residues of poly ethelenetereaphthalate in the Alkali Media
...Show More Authors

The research work involve preparation of activated carbon from Plant corn grain dry in the presence of some additive Residual of poly ethelenetereaphthalate.and the anather way Carbonization was conducted by mixing a known weight of the feedstock with variable quantity of the additive and fixed ratio of Potassium hydroxide. Carbonization completed using fusion in solid state in the absence of solvents. Feedstock and mainly Remnants of poly ethelenetereaphthalate were decompose thermally in a Small chains containing to naphthoxide radicals, these radicals can be connected with the Chains of activated carbon aiming to increase polarity ,This was found from the reaction it self . this research has been studying the product sample was eva

... Show More
View Publication Preview PDF
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon Dec 05 2022
Journal Name
Baghdad Science Journal
A Security and Privacy Aware Computing Approach on Data Sharing in Cloud Environment
...Show More Authors

Today, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jun 30 2024
Journal Name
International Journal Of Intelligent Engineering And Systems
Eco-friendly and Secure Data Center to Detection Compromised Devices Utilizing Swarm Approach
...Show More Authors

Modern civilization increasingly relies on sustainable and eco-friendly data centers as the core hubs of intelligent computing. However, these data centers, while vital, also face heightened vulnerability to hacking due to their role as the convergence points of numerous network connection nodes. Recognizing and addressing this vulnerability, particularly within the confines of green data centers, is a pressing concern. This paper proposes a novel approach to mitigate this threat by leveraging swarm intelligence techniques to detect prospective and hidden compromised devices within the data center environment. The core objective is to ensure sustainable intelligent computing through a colony strategy. The research primarily focusses on the

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref