Preferred Language
Articles
/
bsj-6568
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items with 106 units, and large data which had 20 size-types of items with 110 units. Moreover, it was also compared with another algorithm called Gravitational Search Algorithm (GSA). According to the computational results in those example cases, it can be concluded that higher number of population and iterations can bring higher chances to obtain a better solution. Finally, TLBO shows better performance in solving the 3-D packing problem compared with GSA.          

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Optimization of Locations for Bioswales Stormwater Management Using BMP Siting Tool - Case Study of Sulaymaniyah City-KRG-Iraq
...Show More Authors

Today, urban Stormwater management is one of the main concerns of municipalities and stakeholders. Drought and water scarcity made rainwater harvesting one of the main steps toward climate change adaptation. Due to the deterioration of the quality of urban runoff and the increase of impermeable urban land use, the treatment of urban runoff is essential. Best Management Practice (BMP) and Low Impact Development (LID) approaches are necessary to combat climate change consequences by improving the quantity and quality of water resources. The application of Bioswales along urban streets and roadways can reduce the stress on water resources, recharge groundwater and prevent groundwater pollution. While Sulaymaniyah City has a

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Feb 25 2022
Journal Name
Heat And Mass Transfer
Optimization, equilibrium, kinetics and thermodynamic study of congo red dye adsorption from aqueous solutions using iraqi porcelanite rocks
...Show More Authors

View Publication
Scopus (11)
Crossref (8)
Scopus Clarivate Crossref
Publication Date
Fri Jul 15 2022
Journal Name
International Journal Of Research In Social Sciences & Humanities
SUBJECT REVIEW: APPLIED LINGUISTICS AND LANGUAGE TEACHING
...Show More Authors

Language mirrors understanding of the same or other culture. Meaning is hardly encoded in the world community. Some linguists cannot solve language problems because of its abstractedness. Language communicators learn the second or foreign language at schools for three reasons. First, English is not their first language. Second, they have little or no educational background in experiencing what they know in another language. Third, they have not improved their communication skills in English. Analyzing the language as a mean of communication would not be learned enough without its practice. This paper gives an exclusive preview of applied linguistics. It defines the conversion of different areas of the study of language with second o

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Thu Nov 25 2021
Journal Name
Engineering And Technology Journal
Pentacene Based Organic Field Effect Transistor Using Different Gate Dielectric
...Show More Authors

This paper presents the electrical behavior of the top contact/ bottom gate of an organic field-effect transistor (OFET) utilizing Pentacene as a semiconductor layer with two distinctive gate dielectric materials Polyvinylpyrrolidone (PVP) and Zirconium oxide (ZrO2) were chosen. The influence of the monolayer and bilayer gates insulator on OFET performance was investigated. MATLAB software was used to simulate and determine the electrical characteristics of a device. The output and transfer characteristics were studied for ZrO2, PVP and ZrO2/PVP as an organic gate insulator layer. Both characteristics show a high drain current at the gate dielectric ZrO2/PVP equal to -0.0031A and -0.0015A for output and transfer characteristics respectively

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Neuroscience Informatics
Epileptic EEG activity detection for children using entropy-based biomarkers
...Show More Authors

View Publication
Scopus (13)
Crossref (9)
Scopus Crossref
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
Accounting Mining Data Using Neural Networks (Case study)
...Show More Authors

Business organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
Securing Text Messages Using Graph Theory and Steganography
...Show More Authors

      Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (4)
Scopus Clarivate Crossref