Preferred Language
Articles
/
RhfHNI8BVTCNdQwCUGEe
SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Thu Aug 01 2019
Journal Name
Journal Of Petroleum Science And Engineering
Effect of wettability on particle settlement behavior within Mono-Ethylene Glycol regeneration pre-treatment systems
...Show More Authors

This study was undertaken to diagnose routine settling problems within a third-party oil and gas companies’ Mono-Ethylene Glycol (MEG) regeneration system. Two primary issues were identified including; a) low particle size (<40 μm) resulting in poor settlement within high viscosity MEG solution and b) exposure to hydrocarbon condensate causing modification of particle surface properties through oil-wetting of the particle surface. Analysis of oil-wetted quartz and iron carbonate (FeCO₃) settlement behavior found a greater tendency to remain suspended in the solution and be removed in the rich MEG effluent stream or to strongly float and accumulate at the liquid-vapor interface in comparison to naturally water-wetted particles. As su

... Show More
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Jan 12 2016
Journal Name
Spectral Physics Communications
Photobleaching Analysis of Binary Lasing Compound Systems
...Show More Authors

Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Impact of Azadirachta indica Fruit Mucilage on particle size and swelling index in Central Composite Designed Acyclovir mucoadhesive microspheres
...Show More Authors

The drive of this exploration is to investigate the mucoadhesive assets of A. indica (Azadirachta indica) fruit mucilage by incorporating it into mucoadhesive microspheres with Acyclovir (AVR) as a model drug. The study was performed to check the impact of the mucilage proportion on particle size and swelling index. Nine batches of AVR mucoadhesive microspheres were made with varying proportions of Polyacrylic acid 934P and A. indica fruit mucilage (AIFM). A central composite design with design expert software to check the impact of dependent variables (A. indica mucilage and Polyacrylic acid 934 P levels) on particle size and swelling index as a response. As part of congeniality studies, the batches w

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Properties of Kumaraswamy binary Distribution and compare methods of estimating parameters
...Show More Authors

The recent development in statistics has made statistical distributions the focus of researchers in the process of compensating for some distribution parameters with fixed values and obtaining a new distribution, in this study, the distribution of Kumaraswamy was studied from the constant distributions of the two parameters. The characteristics of the distribution were discussed through the presentation of the probability density function (p.d.f), the cumulative distribution function (c.d.f.), the ratio of r, the reliability function and the hazard function. The parameters of the Kumaraswamy distribution were estimated using MLE, ME, LSEE by using the simulation method for different sampling sizes and using preli

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 02 2019
Journal Name
Baghdad Science Journal
Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management
...Show More Authors

            The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. This recent IT trend is taking the computing experience to the next level. It is an extended and advantageous extension of the centralized cloud computing technology. In this article, we tried to highlight the various issues that currently cloud computing is facing. Here

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Engineering
Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl Design and Implementation of a Generalized N-Digit Binary-To-Decimal Converter on an FPGA Seven-Segment Display Using Verilog Hdl
...Show More Authors

It is often needed to have circuits that can display the decimal representation of a binary number and specifically in this paper on a 7-segment display. In this paper a circuit that can display the decimal equivalent of an n-bit binary number is designed and it’s behavior is described using Verilog Hardware Descriptive Language (HDL). This HDL program is then used to configure an FPGA to implement the designed circuit.

Publication Date
Mon Oct 23 2023
Journal Name
Journal Of Optics
Single mode optical fiber sensor based on surface plasmon resonance for the detection of the oil aging for the electrical transformers
...Show More Authors

This work presents a novel technique for the detection of oil aging in electrical transformers using a single mode optical fiber sensor based on surface plasmon resonance (SPR). The aging of insulating oil is a critical issue in the maintenance and performance of electrical transformers, as it can lead to reduce insulation properties, increase risk of electrical breakdown, and decrease operational lifespan. Many parameters are calculated in this study in order to examine the efficiency of this sensor like sensitivity (S), signal to noise ratio (SNR), resolution (refractive index unit) and figure of merit (FOM) and the values are for figure of merit is 11.05, the signal to noise ratio is 20.3, the sensitivity is 6.63, and the resolution is 3

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sat Jun 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Drag Forces under Longitudinal Interaction of Two Particle
...Show More Authors

Direct measurements of drag force on two interacting particles  arranged in the longitudinal direction for particle Reynolds numbers varying from J O to 103 are conducted using a micro-force measurement system. The effect of the interparticle distance and Reynolds number on the drag forces  is examined. An empirical equation is obtained to describe the effect of the interparticle distance (l/d) on the dimensionless drag.

View Publication Preview PDF
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (14)
Crossref (6)
Scopus Crossref