Preferred Language
Articles
/
ThfuV5IBVTCNdQwCFays
A Direct Solution Scheme for Wide-Angle Electromagnetic Scattering Problems Using Compressive Sensing-Based Method of Moments
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Development A Method For Production Of Carbon Nanotubes
...Show More Authors

In this work chemical vapor deposition method (CVD) for the production of carbon nanotubes (CNTs) have been improved by the addition of S. Steel mesh container (SSMC) inside which the catalyst (Fe/Al2O3) was placed. Scanning electron microscopy (SEM) investigation method used to study nanotubes produced, showed that high yield of two types of (CNTs) obtained, single wall carbon nanotube (SWCNTs) with diameter and length of less than 50nm and several micrometers respectively and nanocoil tubes with a diameter and length of less than 100nm and several micrometers respectively. The chemical analysis of (CNTs) reveals that the main component is carbon (94%) and a little amount of Al (0.32%), Fe (2.22%) the reminder is oxygen. It was also fou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Siam Journal On Control And Optimization
A Duality Approach for Solving Control-Constrained Linear-Quadratic Optimal Control Problems
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Assessing the Effect of Using Porcelanite on Compressive Strength of Roller Compacted Concrete
...Show More Authors

Roller-Compacted Concrete (RCC) is a zero-slump concrete, with no forms, no reinforcing steel, no finishing and is wet enough to support compaction by vibratory rollers. Because the effectiveness of curing on properties and durability, the primary scope of this research is to study the effect of various curing methods (air curing, emulsified asphalt(flan coat) curing, 7 days water curing and permanent water curing) and different porcelanite (local material used as an Internal Curing agent) replacement percentages (volumetric replacement) of fine aggregate on some properties of RCC and to explore the possibility of introducing more practical RCC for road pavement with minimum requirement of curing. Cubes specimens were sawed from the slab

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Fri Mar 17 2017
Journal Name
Elixir Mech. Engg. 109 (2017) 47879-47881, Www. Elixirpublishers. Com …‏
Effect of Cutting Angle for a Locally Assembling Motorized Vibration Cutter on Some Operational Characteristics Used for Date Palm Fronds Cutting
...Show More Authors

Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Semiparametric Bayesian Method with Classical Method for Estimating Systems Reliability using Simulation Procedure
...Show More Authors

               In this research, the semiparametric Bayesian method is compared with the classical  method to  estimate reliability function of three  systems :  k-out of-n system, series system, and parallel system. Each system consists of three components, the first one represents the composite parametric in which failure times distributed as exponential, whereas the second and the third components are nonparametric ones in which reliability estimations depend on Kernel method using two methods to estimate bandwidth parameter h method and Kaplan-Meier method. To indicate a better method for system reliability function estimation, it has be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of The College Of Languages (jcl)
Investigating English Composition Writing Problems Encountered by Preparatory School Students and Finding Solutions to These Problems through Schema- Based Approach
...Show More Authors

Writing in English is one of the essential factors for successful                      EFL learning .Iraqi students at the preparatory schools encounter problems when using their background knowledge in handling subskills                                  of writing(Burhan,2013:164).Therefore, this study aims to investigate the 4thyear preparatory school students’ problems in English composition writing, and find solutions to these pro

... Show More
View Publication Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Sun Apr 08 2018
Journal Name
Al-khwarizmi Engineering Journal
Inverse Kinematics Solution for Redundant Robot Manipulator using Combination of GA and NN
...Show More Authors

A demonstration of the inverse kinematics is a very complex problem for redundant robot manipulator. This paper presents the solution of inverse kinematics for one of redundant robots manipulator (three link robot) by combing of two intelligent algorithms GA (Genetic Algorithm) and NN (Neural Network). The inputs are position and orientation of three link robot. These inputs are entering to Back Propagation Neural Network (BPNN). The weights of BPNN are optimized using continuous GA. The (Mean Square Error) MSE is also computed between the estimated and desired outputs of joint angles. In this paper, the fitness function in GA is proposed. The sinwave and circular for three link robot end effecter and desired trajectories are simulated b

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Sun May 01 2016
Journal Name
Iraqi Journal Of Science
Efficient text in image hiding method based on LSB method principle
...Show More Authors

The steganography (text in image hiding) methods still considered important issues to the researchers at the present time. The steganography methods were varied in its hiding styles from a simple to complex techniques that are resistant to potential attacks. In current research the attack on the host's secret text problem didn’t considered, but an improved text hiding within the image have highly confidential was proposed and implemented companied with a strong password method, so as to ensure no change will be made in the pixel values of the host image after text hiding. The phrase “highly confidential” denoted to the low suspicious it has been performed may be found in the covered image. The Experimental results show that the covere

... Show More
View Publication