Preferred Language
Articles
/
XRZgsYoBVTCNdQwCY6P_
Integration of extreme gradient boosting feature selection approach with machine learning models: application of weather relative humidity prediction
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Jan 17 2023
Journal Name
International Journal Of Online And Biomedical Engineering (ijoe)
An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments
...Show More Authors

Cyber security is a term utilized for describing a collection of technologies, procedures, and practices that try protecting an online environment of a user or an organization. For medical images among most important and delicate data kinds in computer systems, the medical reasons require that all patient data, including images, be encrypted before being transferred over computer networks by healthcare companies. This paper presents a new direction of the encryption method research by encrypting the image based on the domain of the feature extracted to generate a key for the encryption process. The encryption process is started by applying edges detection. After dividing the bits of the edge image into (3×3) windows, the diffusions

... Show More
View Publication
Scopus (6)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Feb 06 2020
Journal Name
Political Sciences Journal
Self-immuniztion: integration of Russian strategic performance a study in the geopolitical orientation circles "of the stage of president putin"n
...Show More Authors

In the period after the collapse of the Soviet Union in 1991, the Federal Republic of Russia witnessed a setback in the overall strategic performance of the country, as it went through a stage of performance flop between the orientation towards Europe in the era of President Boris Yelsen (1991-1999), or the change of direction towards Eurasia, as the Russian Federation managed After President Vladimir Putin assumed power in 2000, from rebuilding the same state and preserving national unity and social cohesion, as well as building a phased military doctrine that made clear moves in Russian strategic thought and future directions towards regions of eternal importance in Russian strategic perception Lack of a set of motivations based on it:

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 20 2025
Journal Name
Journal Of Physical Education
The Effect of Constructive Learning Model on Cognitive Achievement and Learning dribbling Skill in Soccer for Secondary School Students
...Show More Authors

The research aimed at identifying the effect of using constructive learning model on academic achievement and learning soccer dribbling Skill in 2nd grade secondary school students. The researcher used the experimental method on (30) secondary school students; 10 selected for pilot study, 20 were divided into two groups. The experimental group followed constructive learning model while the controlling group followed the traditional method. The experimental program lasted for eight weeks with two teaching sessions per week for each group. The data was collected and treated using SPSS to conclude the positive effect of using constructive learning model on developing academic achievement and learning soccer dribbling Skill in 2nd grade seconda

... Show More
View Publication
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments
...Show More Authors

Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capable of selecting essential data is required in cloud replication environments as the solution. This paper proposed a Crucial File Selection Strategy (CFSS) to address poor response time in a cloud replication environment. A cloud simulator called CloudSim is used to conduct the necessary experiments, and results are presented to evidence the enhancement on replication performance. The obtained an

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Journal Of Engineering
Numerical Prediction of Bond-Slip Behavior in Simple Pull-out Concrete Specimen
...Show More Authors

In this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of this

... Show More
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
Numerical Prediction of Bond-Slip Behavior in Simple Pull-Out Concrete Specimens
...Show More Authors

In this study the simple pullout concrete cylinder specimen reinforced by a single steel bar was analyzed for bond-slip behavior. Three-dimension nonlinear finite element model using ANSYS program was employed to study the behavior of bond between concrete and plain steel reinforcement. The ANSYS model includes eight-noded isoperimetric brick element (SOLID65) to model the concrete cylinder while the steel reinforcing bar was modeled as a truss member (LINK8). Interface element (CONTAC52) was used in this analysis to model the bond between concrete and steel bar. Material nonlinearity due to cracking and/or crushing of concrete, and yielding of the steel reinforcing bar were taken into consideration during the analysis. The accuracy of t

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of The Mechanical Behavior Of Materials
Evaluation of a fire safety risk prediction model for an existing building
...Show More Authors
Abstract<p>Fire is one of the most critical risks devastating to human life and property. Therefore, humans make different efforts to deal with fire hazards. Many techniques have been developed to assess fire safety risks. One of these methods is to predict the outbreak of a fire in buildings, and although it is hard to predict when a fire will start, it is critical to do so to safeguard human life and property. This research deals with evaluating the safety risks of the existing building in the city of Samawah/Iraq and determining the appropriateness of these buildings in terms of safety from fire hazards. Twelve parameters are certified based on the National Fire Protection Association (NFPA20</p> ... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Dec 30 2007
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of Fractional Hold-Up in RDC Column Using Artificial Neural Network
...Show More Authors

In the literature, several correlations have been proposed for hold-up prediction in rotating disk contactor. However,
these correlations fail to predict hold-up over wide range of conditions. Based on a databank of around 611
measurements collected from the open literature, a correlation for hold up was derived using Artificial Neiral Network
(ANN) modeling. The dispersed phase hold up was found to be a function of six parameters: N, vc , vd , Dr , c d m / m ,
s . Statistical analysis showed that the proposed correlation has an Average Absolute Relative Error (AARE) of 6.52%
and Standard Deviation (SD) 9.21%. A comparison with selected correlations in the literature showed that the
developed ANN correlation noticeably

... Show More
View Publication Preview PDF
Publication Date
Mon Jun 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Cutting Force in Turning Process by Using Artificial Neural Network
...Show More Authors

       

Cutting forces are important factors for determining machine serviceability and product quality. Factors such as speed feed, depth of cut and tool noise radius affect on surface roughness and cutting forces in turning operation. The artificial neural network model was used to predict cutting forces with related to inputs including cutting speed (m/min), feed rate (mm/rev), depth of cut (mm) and work piece hardness (Map). The outputs of the ANN model are the machined cutting force parameters, the neural network showed that all (outputs) of all components of the processing force cutting force FT (N), feed force FA (N) and radial force FR (N) perfect accordance with the experimental data. Twenty-five samp

... Show More
View Publication Preview PDF
Crossref (3)
Crossref