Preferred Language
Articles
/
Ihfv840BVTCNdQwCBioU
Investigations for the critical vehicle velocities on a curved path
...Show More Authors

􀀨􀀅􀀆􀀔􀀜􀀄􀀂􀀆􀀈􀀓􀀌􀀩􀀏􀀆􀀉􀀅􀀆􀀉􀀅􀀉􀀚􀀝􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀓􀀚􀀁􀀔􀀄􀀓􀀅􀀆􀀄􀀂􀀆􀀔􀀓􀀆􀀃􀀂􀀔􀀄􀀟􀀉􀀔􀀃􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀗􀀌􀀄􀀔􀀄􀀗􀀉􀀚􀀆􀀂􀀘􀀃􀀃􀀊􀀂􀀆􀀓􀀖􀀆􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀢􀀆􀀪􀀜􀀃􀀆􀀄􀀅􀀛􀀃􀀂􀀔􀀄􀀕􀀉􀀔􀀄􀀓􀀅􀀂􀀆 􀀉􀀌􀀃􀀆􀀙􀀉􀀂􀀃􀀊􀀆􀀓􀀅􀀆􀀉􀀁􀀔􀀓􀀟􀀓􀀙􀀄􀀚􀀃􀀆􀀚􀀉􀀔􀀃􀀌􀀉􀀚􀀆􀀂􀀘􀀉􀀗􀀃􀀆􀀟􀀄􀀊􀀂􀀔􀀆􀀔􀀜􀀃􀀆􀀗􀀃􀀅􀀔􀀃􀀌􀀚􀀄􀀅􀀃􀀂􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀙􀀉􀀂􀀃􀀆􀀈􀀜􀀃􀀃􀀚􀀂􀀆􀀉􀀔􀀆􀀌􀀓􀀉􀀊􀀆􀀫􀀔􀀌􀀉􀀗􀀩􀀆􀀈􀀄􀀊􀀔􀀜􀀑􀀆􀀉􀀅􀀊􀀆􀀔􀀜􀀃􀀆􀀗􀀃􀀅􀀔􀀃􀀌􀀆􀀓􀀖􀀆􀀕􀀌􀀉􀀛􀀄􀀔􀀝􀀆 􀀜􀀃􀀄􀀕􀀜􀀔􀀆􀀫􀀠􀀬􀀑􀀢􀀆􀀪􀀜􀀃􀀆􀀂􀀔􀀁􀀊􀀝􀀆􀀓􀀁􀀔􀀗􀀓􀀟􀀃􀀂􀀆􀀄􀀚􀀚􀀁􀀂􀀔􀀌􀀉􀀔􀀃􀀊􀀆􀀔􀀜􀀉􀀔􀀆􀀈􀀜􀀃􀀅􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀊􀀄􀀟􀀃􀀅􀀂􀀄􀀓􀀅􀀂􀀆􀀛􀀉􀀌􀀄􀀃􀀂􀀆􀀔􀀜􀀃􀀆􀀗􀀌􀀄􀀔􀀄􀀗􀀉􀀚􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀄􀀃􀀂􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆 􀀗􀀉􀀅􀀆􀀙􀀃􀀆􀀛􀀉􀀌􀀄􀀃􀀊􀀆􀀉􀀅􀀊􀀆􀀙􀀃􀀗􀀓􀀟􀀃􀀂􀀆􀀚􀀃􀀂􀀂􀀆􀀊􀀉􀀅􀀕􀀃􀀌􀀓􀀁􀀂􀀏􀀆􀀂􀀓􀀆􀀉􀀂􀀆􀀔􀀓􀀆􀀔􀀜􀀃􀀆􀀔􀀌􀀉􀀗􀀩􀀆􀀈􀀄􀀊􀀔􀀜􀀆􀀓􀀌􀀆􀀔􀀜􀀃􀀆􀀠􀀬􀀆􀀜􀀃􀀄􀀕􀀜􀀔􀀆􀀄􀀅􀀗􀀌􀀃􀀉􀀂􀀃􀀂􀀆􀀔􀀜􀀉􀀔􀀆􀀚􀀃􀀉􀀊􀀂􀀆􀀔􀀓􀀆􀀌􀀃􀀊􀀁􀀗􀀃􀀆􀀔􀀜􀀃􀀆 􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀄􀀃􀀂􀀏􀀆􀀄􀀅􀀆􀀓􀀔􀀜􀀃􀀌􀀆􀀈􀀓􀀌􀀊􀀂􀀏􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀗􀀓􀀅􀀊􀀄􀀔􀀄􀀓􀀅􀀆􀀈􀀄􀀚􀀚􀀆􀀙􀀃􀀆􀀟􀀓􀀌􀀃􀀆􀀊􀀉􀀅􀀕􀀃􀀌􀀓􀀁􀀂􀀢􀀆􀀒􀀃􀀉􀀅􀀈􀀜􀀄􀀚􀀃􀀏􀀆􀀄􀀖􀀆􀀔􀀜􀀃􀀆􀀌􀀉􀀔􀀄􀀓􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀔􀀌􀀉􀀗􀀩􀀆 􀀈􀀄􀀊􀀔􀀜􀀆􀀔􀀓􀀆􀀔􀀜􀀃􀀆􀀗􀀃􀀅􀀔􀀃􀀌􀀆􀀓􀀖􀀆􀀕􀀌􀀉􀀛􀀄􀀔􀀝􀀆􀀜􀀃􀀄􀀕􀀜􀀔􀀆􀀄􀀅􀀗􀀌􀀃􀀉􀀂􀀃􀀂􀀆􀀔􀀜􀀉􀀔􀀆􀀈􀀄􀀚􀀚􀀆􀀚􀀃􀀉􀀊􀀆􀀔􀀓􀀆􀀌􀀄􀀂􀀃􀀆􀀔􀀜􀀃􀀆􀀂􀀉􀀖􀀃􀀔􀀝􀀆􀀓􀀖􀀆􀀔􀀜􀀃􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀟􀀉􀀅􀀃􀀁􀀛􀀃􀀌􀀢􀀆􀀭􀀄􀀔􀀃􀀌􀀉􀀔􀀁􀀌􀀃􀀏􀀆􀀘􀀓􀀄􀀅􀀔􀀃􀀊􀀆 􀀔􀀜􀀉􀀔􀀆􀀔􀀜􀀃􀀆􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀆􀀄􀀂􀀂􀀁􀀃􀀆􀀗􀀉􀀅􀀆􀀙􀀃􀀆􀀂􀀓􀀚􀀛􀀃􀀊􀀆􀀔􀀜􀀌􀀓􀀁􀀕􀀜􀀆􀀁􀀔􀀄􀀚􀀄􀀮􀀄􀀅􀀕􀀆􀀉􀀆􀀙􀀉􀀅􀀩􀀄􀀅􀀕􀀆􀀓􀀅􀀆􀀔􀀜􀀃􀀆􀀌􀀓􀀉􀀊􀀆􀀉􀀂􀀆􀀗􀀓􀀅􀀂􀀔􀀌􀀁􀀗􀀔􀀃􀀊􀀆􀀈􀀄􀀔􀀜􀀆􀀌􀀉􀀗􀀄􀀅􀀕􀀆􀀔􀀌􀀉􀀗􀀩􀀆􀀓􀀌􀀆􀀈􀀄􀀔􀀜􀀆􀀂􀀓􀀆 􀀚􀀄􀀟􀀄􀀔􀀃􀀊􀀆􀀌􀀓􀀉􀀊􀀆􀀗􀀓􀀅􀀂􀀔􀀌􀀁􀀗􀀔􀀄􀀓􀀅􀀢􀀆􀀀􀀓􀀈􀀃􀀛􀀃􀀌􀀏􀀆􀀟􀀓􀀂􀀔􀀚􀀝􀀆􀀔􀀜􀀃􀀆􀀌􀀓􀀉􀀊􀀂􀀆􀀊􀀃􀀂􀀄􀀕􀀅􀀆􀀊􀀓􀀆􀀅􀀓􀀔􀀆􀀜􀀉􀀛􀀃􀀆􀀉􀀆􀀙􀀉􀀅􀀩􀀄􀀅􀀕􀀢􀀆􀀪􀀜􀀃􀀌􀀃􀀖􀀓􀀌􀀃􀀏􀀆􀀔􀀜􀀃􀀆􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀄􀀃􀀂􀀆 􀀂􀀜􀀓􀀁􀀚􀀊􀀆􀀙􀀃􀀆􀀄􀀊􀀃􀀅􀀔􀀄􀀖􀀄􀀃􀀊􀀆􀀔􀀓􀀆􀀛􀀉􀀌􀀄􀀓􀀁􀀂􀀆􀀛􀀃􀀜􀀄􀀗􀀚􀀃􀀆􀀗􀀌􀀃􀀉􀀔􀀄􀀓􀀅􀀂􀀆􀀔􀀓􀀆􀀗􀀓􀀅􀀔􀀌􀀓􀀚􀀆􀀓􀀛􀀃􀀌􀀆􀀔􀀜􀀉􀀔􀀆􀀊􀀉􀀅􀀕􀀃􀀌􀀓􀀁􀀂􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀄􀀃􀀂􀀢􀀆􀀪􀀜􀀃􀀆􀀄􀀅􀀛􀀃􀀂􀀔􀀄􀀕􀀉􀀔􀀄􀀓􀀅􀀂􀀆􀀂􀀜􀀓􀀈􀀆􀀔􀀜􀀉􀀔􀀆􀀔􀀜􀀃􀀆 􀀓􀀛􀀃􀀌􀀔􀀁􀀌􀀅􀀄􀀅􀀕􀀆􀀛􀀃􀀚􀀓􀀗􀀄􀀔􀀝􀀆􀀈􀀄􀀚􀀚􀀆􀀙􀀃􀀆􀀎􀀎􀀢􀀐􀀆􀀟􀀯􀀂􀀆􀀈􀀜􀀃􀀅􀀆􀀔􀀜􀀃􀀆􀀔􀀌􀀉􀀗􀀩􀀆􀀈􀀄􀀊􀀔􀀜􀀆􀀄􀀂􀀆􀀐􀀆􀀟􀀆

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-kindy College Medical Journal
Familial Pulmonary Alveolar Microlithiasis: A Rare Case Report with Emphasis on Imaging Findings
...Show More Authors

ABSTRACT Pulmonary alveolar microlithiasis is rare infiltrative pulmonary disease characterized by intra-alveoli deposition of microliths. We present a familial case of an adult female with complaint of progressive shortness of breath on exertion. Chest radiograph showed innumerable tiny dense nodules, diffusely involving both lungs mainly the lower zones. High-resolution CT scan illustrated widespread intra-alveolar microliths, diffuse ground-glass attenuation areas and septal thickening predominantly in the basal regions. Chest radiograph is all that is needed for the diagnosis of this case but CT scan was done to demonstrate the extent and severity of this disease

View Publication Preview PDF
Publication Date
Wed Apr 24 2024
Journal Name
Cogent Arts & Humanities
Women’s health on social media: a corpus stylistic study of Pink October campaigns
...Show More Authors

.

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
Effect of Velocity on Dissolved Oxygen Cathodic Polarization using a Rotating Cylinder Electrode
...Show More Authors

The aim of the present work to study the effect of changing velocity (Reynold's number) on oxygen cathodic polarization using brass rotating cylinder electrode in 0.1, 0.3 and 0.5N NaCl solutions (PH = 7) at temperatures 40, 50 and 600 C. Cathodic polarization experiments were conducted as a function of electrode rotational speed and concentration.

View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Thu Jan 11 2018
Journal Name
Al-khwarizmi Engineering Journal
Control on a 2-D Wing Flutter Using an Adaptive Nonlinear Neural Controller
...Show More Authors

An adaptive nonlinear neural controller to reduce the nonlinear flutter in 2-D wing is proposed in the paper. The nonlinearities in the system come from the quasi steady aerodynamic model and torsional spring in pitch direction. Time domain simulations are used to examine the dynamic aero elastic instabilities of the system (e.g. the onset of flutter and limit cycle oscillation, LCO). The structure of the controller consists of two models :the modified Elman neural network (MENN) and the feed forward multi-layer Perceptron (MLP). The MENN model is trained with off-line and on-line stages to guarantee that the outputs of the model accurately represent the plunge and pitch motion of the wing and this neural model acts as the identifier. Th

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Geological Journal
A Review on Pressure Transient Analysis in Multilayer Reservoir: South Iraq Case Study
...Show More Authors

Multilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Apr 01 2024
Journal Name
Heliyon
Ground effect of an inverted double element wing diffuser on a sedan car
...Show More Authors

View Publication
Scopus (3)
Crossref (2)
Scopus Clarivate Crossref