Preferred Language
Articles
/
JRj_x5QBVTCNdQwC4yAW
A high-performance non-isolated DC-DC buck converter design based on wide bandgap power devices
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Deterministic Analysis of Wind Loads Effects on High-Rise Buildings
...Show More Authors

This paper studies the effect of mean wind velocity on tall building. Wind velocity, wind profile and wind pressure have been considered as a deterministic phenomenon. Wind velocity has been modelled as a half-sinusoidal wave. Three exposures have been studied B, C, and D. Wind pressure was evaluated by equation that joined wind pressure with mean wind velocity, air density, and drag coefficient.

Variations of dynamic load factor for building tip displacement and building base shear were studied for different building heights, different mode shapes, different terrain exposures, and different aspect ratios of building plan. SAP software, has been used in modelling and dynamic analysis for all case studies.

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 29 2019
Journal Name
5th International Turkic World Conference On Chemical Sciences And Technologies
New Functionalized MWCNT- Functionalized GO Nanocomposite with a High Dielectric Constant
...Show More Authors

In this study, we introduce new a nanocomposite of functionalize graphene oxide FGO and functionalize multi wall carbon nanotube (F-MWCNT-FGO).The formation of nanocomposite was confirmed by FT-IR ,XRD and SEM. The magnitude of the dielectric permittivity of the (F-MWCNT-FGO) nanocomposite appears to be very high in the low frequency range and show a unique negative permittivity at frequencies range from 400 Hz to 4000Hz. The ac conductivity of nanocomposite reaches 23.8 S.m-1 at 100Hz.

Preview PDF
Publication Date
Fri May 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
A review of ultra-high temperature materials for thermal protection system
...Show More Authors
Abstract<p>Ultra-High Temperature Materials (UHTMs) are at the base of entire aerospace industry; these high stable materials at temperatures exceeding 1600 °C are used to manage the heat shielding to protect vehicles and probes during the hypersonic flight through reentry trajectory against aerodynamic heating and reducing plasma surface interaction. Those materials are also recognized as Thermal Protection System Materials (TPSMs). The structural materials used during the high-temperature oxidizing environment are mainly limited to SiC, oxide ceramics, and composites. In addition to that, silicon-based ceramic has a maximum-use at 1700 °C approximately; as it is an active oxidation process o</p> ... Show More
View Publication
Scopus (49)
Crossref (42)
Scopus Clarivate Crossref
Publication Date
Mon Dec 01 2014
Journal Name
2014 Ieee Symposium On Differential Evolution (sde)
Comparative analysis of a modified differential evolution algorithm based on bacterial mutation scheme
...Show More Authors

A new modified differential evolution algorithm DE-BEA, is proposed to improve the reliability of the standard DE/current-to-rand/1/bin by implementing a new mutation scheme inspired by the bacterial evolutionary algorithm (BEA). The crossover and the selection schemes of the DE method are also modified to fit the new DE-BEA mechanism. The new scheme diversifies the population by applying to all the individuals a segment based scheme that generates multiple copies (clones) from each individual one-by-one and applies the BEA segment-wise mechanism. These new steps are embedded in the DE/current-to-rand/bin scheme. The performance of the new algorithm has been compared with several DE variants over eighteen benchmark functions including sever

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Journal Of Applied Sciences And Nanotechnology
Characterization of Prepared Polyaniline Nanofibers Based on a Hydrothermal Variation of Aniline Concentration
...Show More Authors

Polyaniline nanofibers (PAni-NFs) have been synthesized under various concentrations (0.12, 0.16, and 0.2 g/l) of aniline and different times (2h and 3 h) by hydrothermal method at 90°C. Was conducted with the use of X-ray diffraction (XRD), Fourier Transform Infrared spectra (FTIR), Ultraviolet-Visible (UV-VIS) absorption spectra, Thermogravimetric Analysis (TGA), and Field Emission-Scanning Electron Microscopy (FE-SEM). The X-ray diffraction patterns revealed the amorphous nature of all the produced samples. FE-SEM demonstrated that Polyaniline has a nanofiber-like structure. The observed typical peaks of PAni were (1580, 1300-1240, and 821 cm-1 ), analyzed by the chemical bonding of the formed PAni through FTIR spectroscopy. Also, tests

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref