Preferred Language
Articles
/
LBYARocBVTCNdQwClUD0
Time and finance optimization model for multiple construction projects using genetic algorithm
...Show More Authors
Abstract<p>Construction contractors usually undertake multiple construction projects simultaneously. Such a situation involves sharing different types of resources, including monetary, equipment, and manpower, which may become a major challenge in many cases. In this study, the financial aspects of working on multiple projects at a time are addressed and investigated. The study considers dealing with financial shortages by proposing a multi-project scheduling optimization model for profit maximization, while minimizing the total project duration. Optimization genetic algorithm and finance-based scheduling are used to produce feasible schedules that balance the finance of activities at any time with the available funds. The model has been tested in multi scenarios, and the results are analyzed. The results show that negative cash flow is minimized from −693,784 to −634,514 in enterprise I and from −2,646,408 to −2,529,324 in enterprise II in the first scenario and also results show that negative cash flow is minimized to −612,768 with a profit of +200,116 in enterprise I and to −2,597,290 with a profit of +1,537,632 in enterprise II in the second scenario.</p>
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jul 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
A Proposed Hybird Text Cryptographic Method Using Circular Queue
...Show More Authors

The sensitive and important data are increased in the last decades rapidly, since the tremendous updating of networking infrastructure and communications. to secure this data becomes necessary with increasing volume of it, to satisfy securing for data, using different cipher techniques and methods to ensure goals of security that are integrity, confidentiality, and availability. This paper presented a proposed hybrid text cryptography method to encrypt a sensitive data by using different encryption algorithms such as: Caesar, Vigenère, Affine, and multiplicative. Using this hybrid text cryptography method aims to make the encryption process more secure and effective. The hybrid text cryptography method depends on circular queue. Using circ

... Show More
Publication Date
Tue Dec 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
PREPARATION OF PVC HOLLOW FIBER MEMBRANE USING (DMAC/ACETONE)
...Show More Authors

Membrane manufacturing system was operated using dry/wet phase inversion process. A sample of hollow fiber membrane was prepared using (17% wt PVC) polyvinyl chloride as membrane material and N, N Dimethylacetamide (DMAC) as solvent in the first run and the second run was made using (DMAC/Acetone) of ratio 3.4 w/w. Scanning electron microscope (SEM) was used to predict the structure and dimensions of hollow fiber membranes prepared. The ultrafiltration experiments were performed using soluble polymeric solute poly ethylene glycol (PEG) of molecular weight (20000 Dalton) 800 ppm solution 25 °C temperature and 1 bar pressure. The experimental results show that pure water permeation increased from 25.7 to 32.2 (L/m2.h.bar) by adding aceton

... Show More
View Publication Preview PDF
Publication Date
Sat Mar 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Adsorption of Phenol from Aqueous Solution using Paper Waste
...Show More Authors

The exploitation of obsolete recyclable resources including paper waste has the advantages of saving resources and environment protection. This study has been conducted to study utilizing paper waste to adsorb phenol which is one of the harmful organic compound byproducts deposited in the environment. The influence of different agitation methods, pH of the solution (3-11), initial phenol concentration (30-120ppm), adsorbent dose (0.5-2.5 g) and contact time (30-150 min) were studied. The highest phenol removal efficiency obtained was 86% with an adsorption capacity of 5.1 mg /g at optimization conditions (pH of 9, initial phenol concentration of 30 mg/L, an adsorbent dose of 2 g and contact time of 120min and at room temperature).

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Oct 29 2018
Journal Name
International Journal Of Women's Health And Reproduction Sciences
Prediction of Placenta Accreta Using Hyperglycosylated Human Chorionic Gonadotropin
...Show More Authors

Objectives: Hyperglycosylated human chorionic gonadotropin (hCG) is a variant of hCG. In addition, it has a different oligosaccharide structure compared to the regular hCG and promotes the invasion and differentiation of peripheral cytotrophoblast. This study aimed to measure hyperglycosylated hCG as a predictor in the diagnosis of placenta accreta. Materials and Methods: In general, 90 pregnant women were involved in this case-control study among which, 30 ladies (control group) were pregnant within the gestational age of ≥36 weeks with at least one previous caesarean section and a normal sited placenta in transabdominal ultrasound (TAU). The other 60 pregnant women (case

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Synthesis of Cinnamon Nanoparticles by Using Laser Ablation Technique
...Show More Authors

    The natural  polyphenolic  compound that cinnamon contains is well known for its various biological activities, a broad variety of pharmacological and therapeutic properties.  Diversified biomedical and pharmacological applications benefit from organic nanoparticles with controlled properties. Bioactive and non-toxic, cinnamon nanoparticles (CNPs) can be effective antibacterial agents. Driven by this idea, we prepared spherical CNPs using liquid (PLAL) pulse laser ablation technique and defined those NPs. Using Q-switched Nd : YAG With a wavelength of 1064 nm  pulse laser of constant energy 500 mj , And different laser pulses ( 250 , 500 , 750 , 1000 ) pulse /sec a pure cinnamon target submerged in

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Nov 25 2015
Journal Name
Research Journal Of Applied Sciences, Engineering And Technology
Subject Independent Facial Emotion Classification Using Geometric Based Features
...Show More Authors

Accurate emotion categorization is an important and challenging task in computer vision and image processing fields. Facial emotion recognition system implies three important stages: Prep-processing and face area allocation, feature extraction and classification. In this study a new system based on geometric features (distances and angles) set derived from the basic facial components such as eyes, eyebrows and mouth using analytical geometry calculations. For classification stage feed forward neural network classifier is used. For evaluation purpose the Standard database "JAFFE" have been used as test material; it holds face samples for seven basic emotions. The results of conducted tests indicate that the use of suggested distances, angles

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Iraqi Journal Of Laser
Pilonidal Sinus Excision Using Carbon Dioxide Laser 10600 nm
...Show More Authors

The current standard for treating pilonidal sinus (PNS) is surgical intervention with excision of the sinus. Recurrence of PNS can be controlled with good hygiene and regular shaving of the natal cleft, laser treatment is a useful adjunct to prevent recurrence. Carbon dioxide (CO2) laser is a gold standard of soft tissue surgical laser due to its wavelength (10600 nm) thin depth (0.03mm) and collateral thermal zone (150mic).It effectively seals blood vessels, lymphatic, and nerve endings, Moreover wound is rendered sterile by effect of laser. Aim of this study was to apply and assess the clinical usefulness of CO2 10600nm laser in pilonidal sinus excision and decrease chance of recurrence. Design: For 10 patients, between 18 and 39 year

... Show More
View Publication Preview PDF
Publication Date
Fri Apr 30 2010
Journal Name
Journal Of Applied Computer Science & Mathematics
Image Hiding Using Magnitude Modulation on the DCT Coefficients
...Show More Authors

In this paper, we introduce a DCT based steganographic method for gray scale images. The embedding approach is designed to reach efficient tradeoff among the three conflicting goals; maximizing the amount of hidden message, minimizing distortion between the cover image and stego-image,and maximizing the robustness of embedding. The main idea of the method is to create a safe embedding area in the middle and high frequency region of the DCT domain using a magnitude modulation technique. The magnitude modulation is applied using uniform quantization with magnitude Adder/Subtractor modules. The conducted test results indicated that the proposed method satisfy high capacity, high preservation of perceptual and statistical properties of the steg

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 01 2025
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Steganography Based on Image Compression Using a Hybrid Technique
...Show More Authors

Information security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-

... Show More
View Publication
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
An Improved Diffie-Hellman Protocol Security Using Video Entropy
...Show More Authors

The Diffie-Hellman is a key exchange protocol to provide a way to transfer shared secret keys between two parties, although those parties might never have communicated together. This paper suggested a new way to transfer keys through public or non-secure channels depending on the sent video files over the channel and then extract keys. The proposed method of key generation depends on the video file content by using the entropy value of the video frames. The proposed system solves the weaknesses in the Diffie-Hellman key exchange algorithm, which is MIMA (Man-in-the-Middle attack) and DLA( Discrete logarithm attack). When the method used high definition videos with a vast amount of data, the keys generated with a large number up to 5

... Show More
View Publication Preview PDF
Crossref