Preferred Language
Articles
/
NIYp1YYBIXToZYAL-rWa
Simultaneous and consecutive charging and discharging of a PCM-based domestic air heater with metal foam
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Topology-Based Modularity and Modularity Density for Detecting Protein Complexes: A Comparative Study
...Show More Authors

     Binary relations or interactions among bio-entities, such as proteins, set up the essential part of any living biological system. Protein-protein interactions are usually structured in a graph data structure called "protein-protein interaction networks" (PPINs). Analysis of PPINs into complexes tries to lay out the significant knowledge needed to answer many unresolved questions, including how cells are organized and how proteins work. However, complex detection problems fall under the category of non-deterministic polynomial-time hard (NP-Hard) problems due to their computational complexity. To accommodate such combinatorial explosions, evolutionary algorithms (EAs) are proven effective alternatives to heuristics in solvin

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Deep Learning-Based Segmentation and Classification Techniques for Brain Tumor MRI: A Review
...Show More Authors

Early detection of brain tumors is critical for enhancing treatment options and extending patient survival. Magnetic resonance imaging (MRI) scanning gives more detailed information, such as greater contrast and clarity than any other scanning method. Manually dividing brain tumors from many MRI images collected in clinical practice for cancer diagnosis is a tough and time-consuming task. Tumors and MRI scans of the brain can be discovered using algorithms and machine learning technologies, making the process easier for doctors because MRI images can appear healthy when the person may have a tumor or be malignant. Recently, deep learning techniques based on deep convolutional neural networks have been used to analyze med

... Show More
View Publication Preview PDF
Crossref (8)
Crossref
Publication Date
Sat Jul 06 2024
Journal Name
Multimedia Tools And Applications
Text classification based on optimization feature selection methods: a review and future directions
...Show More Authors

A substantial portion of today’s multimedia data exists in the form of unstructured text. However, the unstructured nature of text poses a significant task in meeting users’ information requirements. Text classification (TC) has been extensively employed in text mining to facilitate multimedia data processing. However, accurately categorizing texts becomes challenging due to the increasing presence of non-informative features within the corpus. Several reviews on TC, encompassing various feature selection (FS) approaches to eliminate non-informative features, have been previously published. However, these reviews do not adequately cover the recently explored approaches to TC problem-solving utilizing FS, such as optimization techniques.

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (3)
Scopus Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Charge Stratification and Fuel/Air Ratio Effect on the Efficiency of (ICADE) I. C. Engine Cycle
...Show More Authors

The Isolated Combustion and Diluted Expansion (ICADE) internal combustion engine cycle combines the advantages of constant volume combustion of the Otto cycle with the high compression ratio of the Diesel cycle.   This work studies the effect of isolated air mass (charge stratification) on the efficiency of the cycle; the analysis shows that the decrease of isolated air mass will increase the efficiency of the cycle and the large dilution air mass will quench all NOx forming reactions and reduce unburned hydrocarbons. Furthermore, the effect of Fuel / Air ratio on the efficiency shows that the increase of Fuel / Air ratio will increase efficiency of the cycle.

View Publication Preview PDF
Publication Date
Sat Mar 01 2025
Journal Name
Geoenergy Science And Engineering
Empirical model for predicting slug-pseudo slug and slug-churn transitions of upward air/water flow
...Show More Authors

A pseudo-slug flow is a type of intermittent flow characterized by short, frothy, chaotic slugs that have a structure velocity lower than the mixture velocity and are not fully formed. It is essential to accurately estimate the transition from conventional slug (SL) flow to pseudo-slug (PSL) flow, and from SL to churn (CH), by precisely predicting the pressure losses. Recent research has showed that PSL and CH flows comprise a significant portion of the conventional flow pattern maps. This is particularly true in wellbores and pipelines with highly deviated large-diameter gas-condensate wellbores and pipelines. Several theoretical and experimental works studied the behavior of PSL and CH flows; however, few models have been suggested to pre

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Fri Aug 20 2021
Journal Name
Iop Conf. Series: Materials Science And Engineering
Synthesis, identification, antibacterial, and dyeing applications of complexes of hexadentate (N4O2 donor) Schiff base ligands derived from curcumin with some transition and non–transition metal cations
...Show More Authors

Schiff base ligand (H2CANPT) was prepared by two steps: first, by the condensation of curcumin with 4-amino antipyrin produces4,4'-(((1E,3Z,5Z,6E)-1,7-bis(4-hydroxy-3- methoxyphenyl)hepta-1,6-diene-3,5-diylidene)bis(azanylylidene))bis(1,5-dimethyl-2-phenyl- 1,2-dihydro-3H-pyrazol-3-one) (CANP). Second, by the condensation of (CANP) with L-tyrosine produces2,2'-(((3Z,3'Z)-(((1E,3Z,5Z,6E)-1,7-bis(4-hydroxy-3-methoxyphenyl)hepta 1,6-diene-3,5-diylidene)bis(azanylylidene))bis(1,5-dimethyl-2-phenyl-1,2-dihydro-3-H-pyrazole- 4-yl-3-ylidene))bis(azanylylidene))bis(3-(4-hydroxyphenyl)propanoic acid) (H2CANPT). The resulted Schiff comported as hexadentate coordinated with (N4O2) atoms, then it was treated with some transition and non-transaction met

... Show More
Preview PDF