Preferred Language
Articles
/
fxhCN5UBVTCNdQwC5CrC
Recovery of mono-ethylene glycol by distillation and the impact of dissolved salts evaluated through simulation of field data
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multiphase Flow Behavior Prediction and Optimal Correlation Selection for Vertical Lift Performance in Faihaa Oil Field, Iraq
...Show More Authors

In the petroleum industry, multiphase flow dynamics within the tubing string have gained significant attention due to associated challenges. Accurately predicting pressure drops and wellbore pressures is crucial for the effective modeling of vertical lift performance (VLP). This study focuses on predicting the multiphase flow behavior in four wells located in the Faihaa oil field in southern Iraq, utilizing PIPESIM software. The process of selecting the most appropriate multiphase correlation was performed by utilizing production test data to construct a comprehensive survey data catalog. Subsequently, the results were compared with the correlations available within the PIPESIM software. The outcomes reveal that the Hagedorn and Brown (H

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Geological Journal
A Predictive Model for Estimating Unconfined Compressive Strength from Petrophysical Properties in the Buzurgan Oilfield, Khasib Formation, Using Log Data
...Show More Authors

Unconfined compressive strength (UCS) of rock is the most critical geomechanical property widely used as input parameters for designing fractures, analyzing wellbore stability, drilling programming and carrying out various petroleum engineering projects. The USC regulates rock deformation by measuring its strength and load-bearing capacity. The determination of UCS in the laboratory is a time-consuming and costly process. The current study aims to develop empirical equations to predict UCS using regression analysis by JMP software for the Khasib Formation in the Buzurgan oil fields, in southeastern Iraq using well-log data. The proposed equation accuracy was tested using the coefficient of determination (R²), the average absolute

... Show More
View Publication
Crossref
Publication Date
Sun Oct 06 2024
Journal Name
الذكوات البيض
Self-criticism in Quranic models and its impact on building them
...Show More Authors

Self-criticism is that a person confronts himself with his mistakes in order to reform and develop them for the better, motivate them and inspire hope in them to push them forward and continue to give in this life. The Holy Qur’an teaches us, through the models it cited in its verses, that this is through repentance, a feeling of remorse, and a determination to leave mistakes, and quit disobedience and sins, etc., and all this is done through constructive criticism, and at the same time, one must realize his strengths. , in order to succeed in preserving it and employing it in the right path that pleases God, His Messenger, himself and his society. This has been explained through an introduction, two topics and a conclusion, and God is t

... Show More
Preview PDF
Publication Date
Wed Jan 30 2019
Journal Name
Journal Of The College Of Education For Women
The Rhetoric of the Oppressed Women: The Autobiography of the Iraqi Womanhood A Research in the Mechanisms of the Rhetorical Proceeding in " Alagnabia - The Foreigner" by Alia Mamdouh
...Show More Authors

phenomenon in the Arab women's contemporary literature, but it is rare in Iraqi women's
literature and falls short to the level of the phenomenon until now. Perhaps this is one of the
main reasons that caused the reluctance of researchers to study it, and this is probably the first
academic research in this field.
This research followed the discourse of Autobiography of women in Iraq, depending on the
two factors of charter and reference of the elements of Philippe Lejeune’s definition of the
genre of Autobiography, without focusing on narrative method, so it handled notes,
memories, diaries and biography of the other and counted all under the genre of the
Biography.
It came in three sections, the first follo

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Journal Of Economics And Administrative Sciences
Impact Kaizen Budget to reducing costs and continuous improvement the operations: study in General Company for Light Industries
...Show More Authors

The budget represents a critical accounting tool used for planning and control. It is considered a measure of the results expected to occur.

This study aims to identify the impact of the Kaizen Budget in reducing costs and continuous improvement on the General Company's operations for Light Industries. The research idea is based on the fact that preparing the budget based on constant improvement supports the higher management of people, processes, materials, and production methods, thus enabling them to manage and reduce their costs.

Research results that the prepared budget suffers from many shortages that limit the materials' usefulness for management

View Publication Preview PDF
Crossref