Preferred Language
Articles
/
ijcpe-644
Thermal Conductivity Characteristics of Polymer composites Based on Polyethylene Wastes Filled with Post-Industry Wood Wastes
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Cogent Engineering
IEC 60909 and ANSI standards comparison with ASCC based fault calculations of Iraqi power system
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Nov 13 2012
Journal Name
Wireless Personal Communications
Design and Implementation of a Scalable RFID-Based Attendance System with an Intelligent Scheduling Technique
...Show More Authors

View Publication
Scopus (17)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Multichannel Optimization With Hybrid Spectral- Entropy Markers for Gender Identification Enhancement of Emotional-Based EEGs
...Show More Authors

View Publication
Scopus (25)
Crossref (23)
Scopus Clarivate Crossref
Publication Date
Sun May 02 2021
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the auditor in allocating common costs in the gas industry and its reflection on the company's performance: Applied Research in North Gas Company
...Show More Authors

The auditor has a role in allocating joint costs in the gas industry, and the auditor's procedures are considered as systematic critical examination, analysis and evaluation of everything related to costs in general and joint costs in the gas industry in particular, with the aim of controlling the joint costs of gas industry products, and knowing the share of the cost of each product from the total industry costs Gas products reflect the reality of the company's performance by discovering weaknesses, defects and any errors, to ensure increased effectiveness and efficiency of the parties concerned with auditing them and imposing control and control over the company's resources, as well as

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
mathematical model for segmentation of the overall planning of puplic redemption company- ministry of industry and minerals
...Show More Authors

Abstract

The study presents a mathematical model with a disaggregating approach to the problem of production planning of a fida Company; which belongs to the ministry of Industry. The study considers disaggregating the entire production into 3 productive families of (hydraulic cylinders, Aldblatt (dampers), connections hydraulics with each holds similar characteristics in terms of the installation cost, production time and stock cost. The Consequences are an ultimate use of the available production capacity as well as meeting the requirements of these families at a minimal cost using linear programming. Moreover, the study considers developing a Master production schedule that drives detailed material and production requi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 15 2022
Journal Name
مجلة كلية الاداب | جامعة بغداد
STRUCTURAL AND TYPOLOGICAL FEATURES OF UNITS OF THE RUSSIAN TERMINOLOGICAL SYSTEM OF THE OIL AND GAS INDUSTRY
...Show More Authors

Preview PDF
Publication Date
Wed Mar 24 2021
Journal Name
Ieee Access
Smart IoT Network Based Convolutional Recurrent Neural Network With Element-Wise Prediction System
...Show More Authors

An Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to

... Show More
Scopus (12)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2016
Journal Name
2016 38th Annual International Conference Of The Ieee Engineering In Medicine And Biology Society (embc)
Selecting the optimal movement subset with different pattern recognition based EMG control algorithms
...Show More Authors

View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Nov 01 2020
Journal Name
Iop Conference Series
Modified PRESENT Encryption algorithm based on new 5D Chaotic system
...Show More Authors

Cryptography is a major concern in communication systems. IoE technology is a new trend of smart systems based on various constrained devices. Lightweight cryptographic algorithms are mainly solved the most security concern of constrained devices and IoE systems. On the other hand, most lightweight algorithms are suffering from the trade-off between complexity and performance. Moreover, the strength of the cryptosystems, including the speed of the algorithm and the complexity of the system against the cryptanalysis. A chaotic system is based on nonlinear dynamic equations that are sensitive to initial conditions and produce high randomness which is a good choice for cryptosystems. In this work, we proposed a new five-dimensional of a chaoti

... Show More
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More