Preferred Language
Articles
/
DRe2wo0BVTCNdQwCURvk
Aggregate production planning of Abu Ghraib Dairy factories based on forecasting and goal programming
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
Fast lightweight encryption device based on LFSR technique for increasing the speed of LED performance
...Show More Authors

LED is an ultra-lightweight block cipher that is mainly used in devices with limited resources. Currently, the software and hardware structure of this cipher utilize a complex logic operation to generate a sequence of random numbers called round constant and this causes the algorithm to slow down and record low throughput. To improve the speed and throughput of the original algorithm, the Fast Lightweight Encryption Device (FLED) has been proposed in this paper. The key size of the currently existing LED algorithm is in 64-bit & 128-bit but this article focused mainly on the 64-bit key (block size=64-bit). In the proposed FLED design, complex operations have been replaced by LFSR left feedback technology to make the algorithm perform more e

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Tue Dec 05 2017
Journal Name
International Journal Of Science And Research (ijsr)
Multi Response Optimization of Submerged Arc Welding Using Taguchi Fuzzy Logic Based on Utility Theory
...Show More Authors

Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue May 01 2012
Journal Name
Iraqi Journal Of Physics
Early detection of breast cancer mass lesions by mammogram segmentation images based on texture features
...Show More Authors

Mammography is at present one of the available method for early detection of masses or abnormalities which is related to breast cancer. The most common abnormalities that may indicate breast cancer are masses and calcifications. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Breast cancer is diagnosed at advanced stages with the help of the digital mammogram images. Masses appear in a mammogram as fine, granular clusters, which are often difficult to identify in a raw mammogram. The incidence of breast cancer in women has increased significantly in recent years.
This paper proposes a computer aided diagnostic system for the extracti

... Show More
View Publication Preview PDF
Publication Date
Tue May 06 2025
Journal Name
Aip Conference Proceedings
Enhance the performance of the wind turbine blade based on the blade element momentum theory
...Show More Authors

In order to improve the effectiveness, increase the life cycle, and avoid the blade structural failure of wind turbines, the blades need to be perfectly designed. Knowing the flow angle and the geometric characteristics of the blade is necessary to calculate the values of the induction factors (axial and tangential), which are the basis of the Blade Element Momentum theory (BEM). The aforementioned equations form an implicit and nonlinear system. Consequently, a straightforward iterative solution process can be used to solve this problem. A theoretical study of the aerodynamic performance of a horizontal-axis wind turbine blade was introduced using the BEM. The main objective of the current work is to examine the wind turbine blade’s perf

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
International Journal On Interactive Design And Manufacturing (ijidem)
A real-time automated sorting of robotic vision system based on the interactive design approach
...Show More Authors

View Publication
Scopus (36)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Material Requirements Planning for the Electric Motor in Fuzzy Environment for State Company for Electric Industries
...Show More Authors

ABSTRUCT

This research aims at examining the expected gap between the fact of planning and controlling process of production at the State Company for Electric Industries and implementation of material requirements planning system in fuzzy environment. Developing solutions to bridge the gap is required to provide specific mechanisms subject to the logic of fuzzy rules that will keep pace with demand for increased accuracy and reduced waiting times depending on demand forecast, investment in inventory to reduce costs to a minimum.

The proposed solutions for overcoming the research problem has required some  questions reflecting the problem with its multiple dimensions, which ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Sep 29 2010
Journal Name
Biotechnology Letters
Streptomyces coelicolor increases the production of undecylprodigiosin when interacted with Bacillus subtilis
...Show More Authors

View Publication
Scopus (28)
Crossref (25)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Production of Ethanol from Sugar Beet Waste by Immobilized Saccharomyces Cerevisiae
...Show More Authors

Saccharomyces Cerevisiae cells were immobilized in calcium alginate beads and activated charcoal for use in the
production of ethanol from batch fermentation of sugar beet waste. Treatment of the waste with NaOH to increase the
ability of lignocellulose material to hydrolysis by acid (2N H2SO4) to monosaccharide and disaccharide (mainly glucos).
The high reducing sugar concentration obtained was equal to 9.2gm/100ml (10Brix) after treatment. Fermentation
parameters, are (pH, glucose concentration (2.5-25 gm/100ml), immobilized agent concentration (2.5-25 gm/100ml)
were studied to find the optimum physiological condition. And the highest ethanol concentration obtained from the
fermentation in the presence of 20%(wt/v) ca

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 20 2022
Journal Name
International Journal Of Health Sciences
Determination the optimal conditions for production of nanocellulose from acetic acid bacteria
...Show More Authors

Bacteria could produce bacterial nanocellulose through a procedure steps: polymerization and crystallization, that occur in the cytoplasm of the bacteria, the residues of glucose polymerize to (β-1,4) lineal glucan chains that produced from bacterial cell extracellularly, these lineal glucan are converted to microfbrils, after that these microfbrils collected together to shape very pure three dimensional pored net. It could be obtained a pure cellulose that created by some M.O, from the one of the active producer organism like Acetic acid bacteria (AAB), that it is a gram -ve, motile and live in aerobic condition. The bacterial nanocellulose (BNC) have great consideration in many fields because of its flexible properties, features

... Show More
View Publication
Crossref