Preferred Language
Articles
/
RhavuocBVTCNdQwCG1-b
Cloud computing sensitive data protection using multi layered approach
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Sat Sep 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Sand Modified with Nanoparticles of Calcium, Aluminum, and CTAB in the Form of Layered Double Hydroxide for Removing of Amoxicillin from Groundwater
...Show More Authors

The addition of new reactive sites on the surface area of the inert sand, which are represented by layered double hydroxide nanoparticles, is the primary goal of this work, which aims to transform the sand into a reactive material. Cetyltrimethylammonium bromide (CTAB) surfactant is used in the reaction of calcium extracted from solid waste-chicken eggshells with aluminum prepared from the cheapest coagulant-alum. By separating amoxicillin from wastewater, the performance of coated sand named as "sand coated with (Ca/Al-CTAB)-LDH" was evaluated. Measurements demonstrated that pH of 12 from 8, 9, 10, 11, and 12, CTAB dosage of 0.05 g from 0, 0.03, 0.05, and 0.1 g, ratio of Ca/Al of 2 from 1, 2, 3, and 4, and mass of sand of 1 g/50 mL from

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Mar 03 2019
Journal Name
Iraqi Journal Of Physics
Experimental observation of the far field diffraction patterns of functionalization single and multi-walled carbon nanotubes using nonlinear diffraction technique
...Show More Authors

Nonlinear diffraction pattern can be induced by focusing CW
laser into a thin quartzes cuvette containing nanofluid. The number
of revealed pattern rings indicates to the nonlinear behavior of fluid.
Here, the nonlinear refractive index of each of functionalized single
wall carbon nanotube (F-SWCNTs) suspention and multi wall carbon
nanotube (F-MWCNTs) suspention have been investigated
experimentally .Each of CNTs suspention was at volume fraction of
13×10−5 and 6×10−5. Moreover the laser source at wavelength of
473 nm was used. The results show that SWCNTs suspention
possesses higher nonlinearty than other at the same volume fraction

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Word Cloud Model based on Hate Speech in an Online Social Media Environment
...Show More Authors

Social media is known as detectors platform that are used to measure the activities of the users in the real world. However, the huge and unfiltered feed of messages posted on social media trigger social warnings, particularly when these messages contain hate speech towards specific individual or community. The negative effect of these messages on individuals or the society at large is of great concern to governments and non-governmental organizations. Word clouds provide a simple and efficient means of visually transferring the most common words from text documents. This research aims to develop a word cloud model based on hateful words on online social media environment such as Google News. Several steps are involved including data acq

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Sep 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Pre-Processing and Surface Reconstruction of Points Cloud Based on Chord Angle Algorithm Technique
...Show More Authors

Abstract

Although the rapid development in reverse engineering techniques, 3D laser scanners can be considered the modern technology used to digitize the 3D objects, but some troubles may be associate this process due to the environmental noises and limitation of the used scanners. So, in the present paper a data pre-processing algorithm has been proposed to obtain the necessary geometric features and mathematical representation of scanned object from its point cloud which obtained using 3D laser scanner (Matter and Form) through isolating the noised points. The proposed algorithm based on continuous calculations of chord angle between each adjacent pair of points in point cloud. A MATLAB program has been built t

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Telematics And Informatics
Modelling the utilization of cloud health information systems in the Iraqi public healthcare sector
...Show More Authors

View Publication
Scopus (67)
Crossref (40)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Cybersecurity And Information Management
A New Automated System Approach to Detect Digital Forensics using Natural Language Processing to Recommend Jobs and Courses
...Show More Authors

A resume is the first impression between you and a potential employer. Therefore, the importance of a resume can never be underestimated. Selecting the right candidates for a job within a company can be a daunting task for recruiters when they have to review hundreds of resumes. To reduce time and effort, we can use NLTK and Natural Language Processing (NLP) techniques to extract essential data from a resume. NLTK is a free, open source, community-driven project and the leading platform for building Python programs to work with human language data. To select the best resume according to the company’s requirements, an algorithm such as KNN is used. To be selected from hundreds of resumes, your resume must be one of the best. Theref

... Show More
View Publication
Scopus Crossref
Publication Date
Wed Apr 06 2022
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Management using the Six Sigma approach to cost rationalization of activities : Application in the Iraqi mechanical carpet factory
...Show More Authors

The textile industries play a prominent role in reviving the national economy, but they are currently suffering from several problems, including the high costs of their activities, the low quality of their production processes, and accordingly, the hexagonal diffraction approach came to help analyze production activities to determine which of them are the most expensive and do not have a benefit or cost greater than Its benefit as a result of waste and losses that accompany its implementation. And by applying to the Iraqi mechanical carpet factory, the research reached several conclusions, the most important of which is the presence of several sources of waste and loss, such as activities and operations that do not add value, whi

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Thu Jan 02 2025
Journal Name
Applied Computing And Informatics
WisdomModel: convert data into wisdom
...Show More Authors

Scopus (2)
Scopus