This paper reports a numerical study of flow behaviors and natural convection heat transfer characteristics in an inclined open-ended square cavity filled with air. The cavity is formed by adiabatic top and bottom walls and partially heated vertical wall facing the opening. Governing equations in vorticity-stream function form are discretized via finite-difference method and are solved numerically by iterative successive under relaxation (SUR) technique. A computer program to solve mathematical model has been developed and written as a code for MATLAB software. Results in the form of streamlines, isotherms, and average Nusselt number, are obtained for a wide range of Rayleigh numbers 103-106 with Prandtl number 0.71
... Show MoreA robust and sensitive analytical method is presented for the extraction and determination of six pharmaceuticals in freshwater sediments.
This investigation proposed an identification system of offline signature by utilizing rotation compensation depending on the features that were saved in the database. The proposed system contains five principle stages, they are: (1) data acquisition, (2) signature data file loading, (3) signature preprocessing, (4) feature extraction, and (5) feature matching. The feature extraction includes determination of the center point coordinates, and the angle for rotation compensation (θ), implementation of rotation compensation, determination of discriminating features and statistical condition. During this work seven essential collections of features are utilized to acquire the characteristics: (i) density (D), (ii) average (A), (iii) s
... Show MoreIn this study, a genetic algorithm (GA) is used to detect damage in curved beam model, stiffness as well as mass matrices of the curved beam elements is formulated using Hamilton's principle. Each node of the curved beam element possesses seven degrees of freedom including the warping degree of freedom. The curved beam element had been derived based on the Kang and Yoo’s thin-walled curved beam theory. The identification of damage is formulated as an optimization problem, binary and continuous genetic algorithms
(BGA, CGA) are used to detect and locate the damage using two objective functions (change in natural frequencies, Modal Assurance Criterion MAC). The results show the objective function based on change in natural frequency i
Smishing is the delivery of phishing content to mobile users via a short message service (SMS). SMS allows cybercriminals to reach out to mobile end users in a new way, attempting to deliver phishing messages, mobile malware, and online scams that appear to be from a trusted brand. This paper proposes a new method for detecting smishing by combining two detection methods. The first method is uniform resource locators (URL) analysis, which employs a novel combination of the Google engine and VirusTotal. The second method involves examining SMS content to extract efficient features and classify messages as ham or smishing based on keywords contained within them using four well-known classifiers: support vector machine (SVM), random
... Show MorePseudomonas aeruginosa has variety of virulence factors that contribute to its pathogenicity. Therefore, rapid detection with high accuracy and specificity is very important in the control of this pathogenic bacterium. To evaluate the accuracy and specificity of Polymerase Chain Reaction (PCR) assay, ETA and gyrB genes were targeted to detect pathogenic strains of P. aeruginosa. Seventy swab samples were taken from patients with infected wounds and burns in two hospitals in Erbil and Koya cities in Iraq. The isolates were traditionally identified using phenotypic methods, and DNA was extracted from the positive samples, to apply PCR using the species specific primers targeting ETA, the gene encoding for exotoxin A, and gyrB gene. The res
... Show MoreThe Internet of Things (IoT) has become a hot area of research in recent years due to the significant advancements in the semiconductor industry, wireless communication technologies, and the realization of its ability in numerous applications such as smart homes, health care, control systems, and military. Furthermore, IoT devices inefficient security has led to an increase cybersecurity risks such as IoT botnets, which have become a serious threat. To counter this threat there is a need to develop a model for detecting IoT botnets.
This paper's contribution is to formulate the IoT botnet detection problem and introduce multiple linear regression (MLR) for modelling IoT botnet features with discriminating capability and alleviatin
... Show MoreKarbala province was one of the most important areas in Iraq and considered an
economic resource of vegetation such as trees of fruits, sieve and other vegetation.
This research aimed to utilize change detection for investigating the current
vegetation cover at last three decay. The main objectives of this research are collect
a group of studied area (Karbala province) satellite images in sequence time for
the same area, these image captured by Landsat (TM 1995, ETM+ 2005 and
Landsat 8 OLI (Operational Land Imager) 2015. Preprocessing such as atmosphere
correction and rectification has been done. Mosaic model between the parts of
studied area was performing. Gap filling consider being very important step has
be
Epilepsy is one of the most common diseases of the nervous system around the world, affecting all age groups and causing seizures leading to loss of control for a period of time. This study presents a seizure detection algorithm that uses Discrete Cosine Transformation (DCT) type II to transform the signal into frequency-domain and extracts energy features from 16 sub-bands. Also, an automatic channel selection method is proposed to select the best subset among 23 channels based on the maximum variance. Data are segmented into frames of one Second length without overlapping between successive frames. K-Nearest Neighbour (KNN) model is used to detect those frames either to ictal (seizure) or interictal (non-
... Show More