Preferred Language
Articles
/
dRarE4cBVTCNdQwCkDS7
Determining and Predicting the Water Demand Dynamic System Model Mapping Urban Crawling and Monitoring Using Remote Sensing Techniques and GIS
...Show More Authors

Publication Date
Tue Jan 01 2019
Journal Name
Advances In Computational Intelligence And Robotics
Groupwise Non-Rigid Image Alignment Using Few Parameters: Registration of Facial and Medical Images
...Show More Authors

Groupwise non-rigid image alignment is a difficult non-linear optimization problem involving many parameters and often large datasets. Previous methods have explored various metrics and optimization strategies. Good results have been previously achieved with simple metrics, requiring complex optimization, often with many unintuitive parameters that require careful tuning for each dataset. In this chapter, the problem is restructured to use a simpler, iterative optimization algorithm, with very few free parameters. The warps are refined using an iterative Levenberg-Marquardt minimization to the mean, based on updating the locations of a small number of points and incorporating a stiffness constraint. This optimization approach is eff

... Show More
View Publication
Publication Date
Sat Oct 04 2025
Journal Name
Mesopotamian Journal Of Computer Science
Enhanced IOT Cyber-Attack Detection Using Grey Wolf Optimized Feature Selection and Adaptive SMOTE
...Show More Authors

The Internet of Things (IoT) has significantly transformed modern systems through extensive connectivity but has also concurrently introduced considerable cybersecurity risks. Traditional rule-based methods are becoming increasingly insufficient in the face of evolving cyber threats.  This study proposes an enhanced methodology utilizing a hybrid machine-learning framework for IoT cyber-attack detection. The framework integrates a Grey Wolf Optimizer (GWO) for optimal feature selection, a customized synthetic minority oversampling technique (SMOTE) for data balancing, and a systematic approach to hyperparameter tuning of ensemble algorithms: Random Forest (RF), XGBoost, and CatBoost. Evaluations on the RT-IoT2022 dataset demonstrat

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
A review on Activated Carbon Prepared from Agricultural Waste using Conventional and Microwave Activation
...Show More Authors

In the recent years the research on the activated carbon preparation from agro-waste and byproducts have been increased due to their potency for agro-waste elimination. This paper presents a literature review on the synthesis of activated carbon from agro-waste using microwave irradiation method for heating. The applicable approach is highlighted, as well as the effects of activation conditions including carbonization temperature, retention period, and impregnation ratio. The review reveals that the agricultural wastes heated using a chemical process and microwave energy can produce activated carbon with a surface area that is significantly higher than that using the conventional heating method.

View Publication Preview PDF
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Thu Mar 29 2018
Journal Name
Construction Research Congress 2018
Validation of Time-Safety Influence Curve Using Empirical Safety and Injury Data—Poisson Regression
...Show More Authors

View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (4)
Scopus Crossref
Publication Date
Tue Nov 01 2011
Journal Name
Journal Of The Saudi Society Of Dermatology & Dermatologic Surgery
Treatment of pityriasis versicolor using 1% diclofenac gel and clotrimazole cream (comparative therapeutic study)
...Show More Authors

KE Sharquie, HM Al-Hamamy, AA Noaimi, IA Al-Shawi, Journal of the Saudi Society of Dermatology & Dermatologic Surgery, 2011 - Cited by 9

View Publication
Publication Date
Thu Feb 01 2024
Journal Name
Baghdad Science Journal
Biosynthesis, Characterization, Adsorption and Antimicrobial studies of Vanadium Oxide Nanoparticles Using Punica Granatum Extract
...Show More Authors

This study includes using green or biosynthesis-friendly technology, which is effective in terms of low cost and low time and energy to prepare V2O5NPs nanoparticles from vanadium sulfate VSO4.H2O using aqueous extract of Punica Granatum at a concentration of 0.1M and with a basic medium PH= 8-12. The V2O5NPs nanoparticles were diagnosed using several techniques, such as FT-IR, UV-visible with energy gap Eg = 3.734eV, and the X-Ray diffraction XRD was calculated using the Debye Scherrer equation. It was discovered to be 34.39nm, Scanning Electron Microscope (SEM), Transmission Electron Microscopy TEM. The size, structure, and composition of synthetic V2O5

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Biosynthesis, Characterization, Adsorption and Antimicrobial studies of Manganese oxide Nanoparticles Using Punica Granatum Extract
...Show More Authors

Manganese sulfate and Punica granatum plant extract were used to create MnO2 nanoparticles, which were then characterized using techniques like Fourier transform infrared spectroscopy, ultraviolet-visible spectroscopy, atomic force microscopy, X-ray diffraction, transmission electron microscopy, scanning electron microscopy, and energy-dispersive X-ray spectroscopy. The crystal's size was calculated to be 30.94nm by employing the Debye Scherrer equation in X-ray diffraction. MnO2 NPs were shown to be effective in adsorbing M(II) = Co, Ni, and Cu ions, proving that all three metal ions may be removed from water in one go. Ni(II) has a higher adsorption rate throughout the board. Co, Ni, and Cu ion removal efficiencie

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (7)
Scopus Crossref
Publication Date
Wed Aug 20 2025
Journal Name
International Journal Of Advanced Research In Computer Science
IMPROVE DATA ENCRYPTION BY USING DIFFIE-HELLMAN AND DNA ALGORITHMS, AUTHENTICATED BY HMAC-HASH256
...Show More Authors

: The need for means of transmitting data in a confidential and secure manner has become one of the most important subjects in the world of communications. Therefore, the search began for what would achieve not only the confidentiality of information sent through means of communication, but also high speed of transmission and minimal energy consumption, Thus, the encryption technology using DNA was developed which fulfills all these requirements [1]. The system proposes to achieve high protection of data sent over the Internet by applying the following objectives: 1. The message is encrypted using one of the DNA methods with a key generated by the Diffie-Hellman Ephemeral algorithm, part of this key is secret and this makes the pro

... Show More
View Publication
Crossref
Publication Date
Tue Jun 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Partial Least Square Regression(PLSR) and Tree Regression by Using Simulation(RT).
...Show More Authors

This research discussed, the process of comparison between the regression model of partial least squares and tree regression, where these models included two types of statistical methods represented by the first type "parameter statistics" of the partial least squares, which is adopted when the number of variables is greater than the number of observations and also when the number of observations larger than the number of variables, the second type is the "nonparametric statistic" represented by tree regression, which is the division of data in a hierarchical way. The regression models for the two models were estimated, and then the comparison between them, where the comparison between these methods was according to a Mean Square

... Show More
View Publication Preview PDF
Crossref