Preferred Language
Articles
/
ijcpe-422
Prediction of the Point Efficiency of Sieve Tray Using Artificial Neural Network
...Show More Authors

An application of neural network technique was introduced in modeling the point efficiency of sieve tray, based on a
data bank of around 33l data points collected from the open literature.Two models proposed,using back-propagation
algorithm, the first model network consists: volumetric liquid flow rate (QL), F foctor for gas (FS), liquid density (pL),
gas density (pg), liquid viscosity (pL), gas viscosity (pg), hole diameter (dH), weir height (hw), pressure (P) and surface
tension between liquid phase and gas phase (o). In the second network, there are six parameters as dimensionless
group: Flowfactor (F), Reynolds number for liquid (ReL), Reynolds number for gas through hole (Reg), ratio of weir
height to hole diqmeter (hw/dH), ratio of pressure of process to atmosphere pressure (P/Pa), Weber number (lTe).
Statistical analysis showed that the proposed models have an average absolute relative error (AARE) of 9.3% and
standard deviation (SD) of 9.7%for first model, AARE of 9.35% and SD of 10.5%for second model and AARE of 9.8%
and SD of 7.5% for the third model.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Hybrid Algorithm for Generate Database Index Key Based on Image Contents
...Show More Authors

  This paper deals with proposing new lifting scheme (HYBRID Algorithm) that is capable of preventing images and documents which are fraud through decomposing there in to the real colors value arrays (red, blue and green) to create retrieval keys for its properties and store it in the database and then check the document originality by retrieve the query image or document through the decomposition described above and compare the predicted color values (retrieval keys)  of the query document with those stored in the database. The proposed algorithm has been developed from the two known lifting schemes (Haar and D4) by merging them to find out HYBRID lifting scheme. The validity and accuracy of the proposed algorithm have been ev

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
An Improved Meerkat Clan Algorithm for Solving 0-1 Knapsack Problem
...Show More Authors

     Meerkat Clan Algorithm (MCA) is a nature-based metaheuristic algorithm which imitates the intelligent behavior of the meerkat animal. This paper presents an improvement on the MCA based on a chaotic map and crossover strategy (MCA-CC). These two strategies increase the diversification and intensification of the proposed algorithm and boost the searching ability to find more quality solutions. The 0-1 knapsack problem was solved by the basic MCA and the improved version of this algorithm (MCA-CC). The performance of these algorithms was tested on low and high dimensional problems. The experimental results demonstrate that the proposed algorithm had overcome the basic algorithm in terms of solution quality, speed a

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Mar 31 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
A Cryptosystem for Database Security Based on RC4 Algorithm
...Show More Authors

Because of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables

View Publication
Crossref (1)
Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Combining a Hill Encryption Algorithm and LSB Technique With Dispersed Way for Securing Arabic and English Text Messages Hidden in Cover Image
...Show More Authors

         In this paper a hybrid system was designed for securing transformed or stored text messages(Arabic and english) by embedding the message in a colored image as a cover file depending on LSB (Least Significant Bit) algorithm in a dispersed way and employing Hill data encryption algorithm for encrypt message before being hidden, A key of 3x3 was used for encryption with inverse for decryption, The system scores a good result for PSNR rate      ( 75-86) that differentiates according to  length of message and image resolution.

View Publication Preview PDF
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r

... Show More
View Publication Preview PDF
Scopus (24)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
International Journal Of Advanced And Applied Sciences
High-accuracy models for iris recognition with merging features
...Show More Authors

Due to advancements in computer science and technology, impersonation has become more common. Today, biometrics technology is widely used in various aspects of people's lives. Iris recognition, known for its high accuracy and speed, is a significant and challenging field of study. As a result, iris recognition technology and biometric systems are utilized for security in numerous applications, including human-computer interaction and surveillance systems. It is crucial to develop advanced models to combat impersonation crimes. This study proposes sophisticated artificial intelligence models with high accuracy and speed to eliminate these crimes. The models use linear discriminant analysis (LDA) for feature extraction and mutual info

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Wed Jan 25 2012
Journal Name
Synthesis, Characterization And Antibacterial Activities Of Some Metal (ii) Heterocyclic Polyamine Complexes With 6,6'-(1,4-phenylenebis(azanediyl) Bis(2- Amino-6-methyl-6h-1,3-oxazin-4-ol) Ligand.
Synthesis, characterization and Antibacterial activities of some metal (II) heterocyclic polyamine complexes with 6,6'-(1,4-phenylenebis(azanediyl) bis(2-amino-6-methyl-6H-1,3-oxazin-4-ol) ligand.
...Show More Authors

Preview PDF
Publication Date
Thu Jan 01 2015
Journal Name
Chemistry And Materials Research
Synthesis, Physico-Chemical and Antimicrobial Activities Co(II),Ni (II) ,Cu(II), Zn(II),Cd(II) and Hg(II) Mixed- Ligand Complexes of L- Alanine and Trimethoprim Antibiotic
...Show More Authors

The Co (II), Ni (II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II) complexes of mixed of amino acid (L-Alanine ) and Trimethoprim antibiotic were synthesized. The complexes were characterized using melting point, conductivity measurement and determination the percentage of the metal in the complexes by flame (AAS). Magnetic susceptibility, Spectroscopic Method [FTIR and UV-Vis]. The general formula have been given for the prepared mixed ligand complexes [M(Ala)2(TMP)(H2O)] where L- alanine (abbreviated as (Ala ) = (C5H9NO2) deprotonated primary ligand, L- Alanine ion .= (C5H8NO2 -) Trimethoprim (abbreviated as (TMP ) = C10H11N3O3S M(II) = Co (II),Ni(II) ,Cu(II), Zn(II) ,Cd(II) and Hg(II). The results showed that the deprotonated L- Alanine by KOH (Ala

... Show More
Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Advances In Physics Theories And Applications
Adsorption Study of Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1,2-diylidenebis(methan-1-yl-1-ylidene) bis (2-methoxyphenol)] on Granulated Initiated Calcined Iraqi Montmorillonite via Columnar Method.
...Show More Authors

The adsorption ability of Iraqi initiated calcined granulated montmorillonite to adsorb Symmetrical Schiff Base Ligand 4,4’-[hydrazine-1, 2-diylidenebis (methan-1-yl-1-ylidene)) bis (2-methoxyphenol)] derived from condensation reaction of hydrazine hydrate and 4-hydroxy-3-methoxybenzaldehyde, from aqueous solutions has been investigated through columnar method.The ligand (H2L) adsorption found to be dependent on adsorbent dosage, initial concentration and contact time.All columnar experiments were carried out at three different pH values (5.5, 7and 8) using buffer solutions at flow rate of (3 drops/ min.),at room temperature (25±2)°C. The experimental isotherm data were analyzed using Langmuir, Freundlich and Temkin equations. The monol

... Show More
Preview PDF