Preferred Language
Articles
/
TBh35pYBVTCNdQwCsonA
A novel designed nanofibrous mat based on hydroxypropyl methyl cellulose incorporating mango peel extract for potential use in wound care system
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 01 2019
Journal Name
Advances On Computational Intelligence In Energy
A Theoretical Framework for Big Data Analytics Based on Computational Intelligent Algorithms with the Potential to Reduce Energy Consumption
...Show More Authors

Within the framework of big data, energy issues are highly significant. Despite the significance of energy, theoretical studies focusing primarily on the issue of energy within big data analytics in relation to computational intelligent algorithms are scarce. The purpose of this study is to explore the theoretical aspects of energy issues in big data analytics in relation to computational intelligent algorithms since this is critical in exploring the emperica aspects of big data. In this chapter, we present a theoretical study of energy issues related to applications of computational intelligent algorithms in big data analytics. This work highlights that big data analytics using computational intelligent algorithms generates a very high amo

... Show More
View Publication
Scopus (1)
Scopus Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Separation And Purification Technology
A comprehensive review on the use of Ti3C2Tx MXene in membrane-based water treatment
...Show More Authors

View Publication
Scopus (25)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Food Chemistry
Development of cellulose Nanofiber-based substrates for rapid detection of ferbam in kale by Surface-enhanced Raman spectroscopy
...Show More Authors

View Publication
Scopus (28)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Communications In Mathematical Biology And Neuroscience
The impact of fear and harvesting on plankton-fish system dynamics incorporating harmful phytoplankton in the contaminated environment
...Show More Authors

View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures
...Show More Authors

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Diyala Journal Of Medicine
Histological Evaluation of Local Application of Flavonoid Extract of Capparis Spinosa on Wound Healing in Alloxan-Induced Diabetic Rats
...Show More Authors

View Publication
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 01 2015
Journal Name
Drug Design, Development And Therapy
Effect of Clausena excavata Burm. f. (Rutaceae) leaf extract on wound healing and antioxidant activity in rats
...Show More Authors

View Publication
Scopus (42)
Crossref (12)
Scopus Clarivate Crossref