Preferred Language
Articles
/
ijs-5252
Root Cause Analysis And Improvement In Windows System Based On Windows Performance Toolkit WPT
...Show More Authors

       Performance issues could be appearing from anywhere in a computer system, finding the root cause of those issues is a troublesome issue due to the complexity of the modern systems and applications. Microsoft builds multiple mechanisms to make their engineers understand what is happening inside All Windows versions including Windows 10 Home and the behavior of any application working on it whether Microsoft services or even third-party applications, one of those mechanisms is the Event Tracing for Windows (ETW) which is the core of logging and tracing in Windows operating system to trace the internal events of the system and its applications. This study goes deep into internal process activities to investigate root cause analysis on Windows 10 Home 20H2, core i5 processor with 4 cores and 8GB of RAM. After simulating workload to get a performance issue, that makes the system and application get unresponsive, then using Windows Performance Toolkit WPT to trace and analyze the event log for root cause investigation. Our results demonstrate analysis works using WPT for decision making such as the reasons of underutilization on CPU and disk, labeling the highlighted patterns, the unbalanced use of system calls in memory, and deciding that the usage preview is the best way to get an idea about applications behavior inside Windows systems resources. Overall improving resources utilization usage and identifying the cause of slowing memory allocation, inefficient disk usage, and throughput.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Strength Improvement of Clay Soil by Using Stone Powder
...Show More Authors

Soil stabilization with stone powder is a good solution for the construction of subgrade for road way and railway lines, especially under the platforms and mostly in transition zones between embankments and rigid structures, where the mechanical properties of supporting soils are very influential. Stone powder often has a unique composition which justifies the need for research to study the feasibility of using this stone powder type for ground improvement applications. This paper presents results from a comprehensive laboratory study carried out to investigate the feasibility of using stone powder for improvement of engineering properties of clays.

The stone powder contains bassanite (CaSO4. ½ H

... Show More
View Publication Preview PDF
Publication Date
Fri Sep 29 2017
Journal Name
Journal Of Engineering
Studying the Improvement of the Solubility of Cellulosic Fibers
...Show More Authors

This study focuses for improving the increase the solubility of fiber cellulose in sodium hydroxide solution in concentrations ranging from (4- 12%), from one point of view and from other point of view in (sodium hydroxide and urea) solution concentration (6% NaOH + 4% urea), under  low temperature (- 15, - 20 Co) , depending on the principle of  reducing the degree of polymerization for  fiber cellulose, which is represented in our tests cotton linter who its represent  (Whatman filter paper, Grade 1), some samples subjected to chemical pretreatment as simulation the method of decomposition of cellulosic materials by white or brown fungi that grow on trees, this method involves the use of

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Research on Emotion Classification Based on Multi-modal Fusion
...Show More Authors

Nowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Wed Mar 30 2022
Journal Name
Iraqi Journal Of Science
A Review on E-Voting Based on Blockchain Models
...Show More Authors

    Developing a solid e-voting system that offers fairness and privacy for users is a challenging objective. This paper is trying to address whether blockchain can be used to build an efficient e-voting system, also, this research has specified four blockchain technologies with their features and limitations. Many papers have been reviewed in a study covered ten years from 2011 to 2020. As a result of the study, the blockchain platform can be a successful public ledger to implement an e-voting system. Four blockchain technologies have been noticed from this study. These are blockchain using smart contracts, blockchain relying on Zcash platform, blockchain programmed from scratch, and blockchain depending on digital signature. Each bl

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sun Aug 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Improve operational performance by simulating the Holonic manufacturing system A case study at the rubber product plant in Al-Najaf Al-Ashraf
...Show More Authors

The research aims to improve operational performance through the application of the Holonic Manufacturing System (HMS) in the rubber products factory in Najaf. The problem was diagnosed with the weakness of the manufacturing system in the factory to meet customers' demands on time within the available resources of machines and workers, which led to time delays of Processing and delivery, increased costs, and reduced flexibility in the factory, A case study methodology used to identify the reality of the manufacturing system and the actual operational performance in the factory. The simulation was used to represent the proposed (HMS) by using (Excel 2010) based on the actual data and calculate the operational performance measures

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 01 2020
Journal Name
Journal Of Engineering Science And Technology
HYBRID CIPHERING METHOD BASED ON CHAOS LOGISTIC MAP AND FINGERPRINT INFORMATION
...Show More Authors

In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More
Scopus (8)
Scopus
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Finger Vein Recognition Based on PCA and Fusion Convolutional Neural Network
...Show More Authors

Finger vein recognition and user identification is a relatively recent biometric recognition technology with a broad variety of applications, and biometric authentication is extensively employed in the information age. As one of the most essential authentication technologies available today, finger vein recognition captures our attention owing to its high level of security, dependability, and track record of performance. Embedded convolutional neural networks are based on the early or intermediate fusing of input. In early fusion, pictures are categorized according to their location in the input space. In this study, we employ a highly optimized network and late fusion rather than early fusion to create a Fusion convolutional neural network

... Show More
Publication Date
Sun Jan 16 2022
Journal Name
Iraqi Journal Of Science
Auto Crop and Recognition for Document Detection Based on its Contents
...Show More Authors

An Auto Crop method is used for detection and extraction signature, logo and stamp from the document image. This method improves the performance of security system based on signature, logo and stamp images as well as it is extracted images from the original document image and keeping the content information of cropped images. An Auto Crop method reduces the time cost associated with document contents recognition. This method consists of preprocessing, feature extraction and classification. The HSL color space is used to extract color features from cropped image. The k-Nearest Neighbors (KNN) classifier is used for classification. 

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Information Hiding And Multimedia Signal Processing
Enhancement of lsb audio steganography based on carrier and message characteristics
...Show More Authors

Data steganography is a technique used to hide data, secret message, within another data, cover carrier. It is considered as a part of information security. Audio steganography is a type of data steganography, where the secret message is hidden in audio carrier. This paper proposes an efficient audio steganography method that uses LSB technique. The proposed method enhances steganography performance by exploiting all carrier samples and balancing between hiding capacity and distortion ratio. It suggests an adaptive number of hiding bits for each audio sample depending on the secret message size, the cover carrier size, and the signal to noise ratio (SNR). Comparison results show that the proposed method outperforms state of the art methods

... Show More