Preferred Language
Articles
/
ijs-5767
Solving Adaptive Distributed Routing Algorithm Using Crow Search Algorithm
...Show More Authors

    Crow Search Algorithm (CSA) can be defined as one of the new swarm intelligence algorithms that has been developed lately, simulating the behavior of a crow in a storage place and the retrieval of the additional food when required. In the theory of the optimization, a crow represents a searcher, the surrounding environment represents the search space, and the random storage of food location represents a feasible solution. Amongst all the food locations, the one where the maximum amount of the food is stored is considered as the global optimum solution, and objective function represents the food amount. Through the simulation of crows’ intelligent behavior, the CSA attempts to find the optimum solutions to a variety of the problems that are related to the optimization. This study presents a new adaptive distributed algorithm of routing on CSA. Because the search space may be modified according to the size and kind of the network, the algorithm can be easily customized to the issue space. In contrast to population-based algorithms that have a broad and time-consuming search space. For ten networks of various sizes, the technique was used to solve the shortest path issue. And its capability for solving the problem of the routing in the switched networks is examined: detecting the shortest path in the process of a data packet transfer amongst the networks. The suggested method was compared with four common metaheuristic algorithms (which are: ACO, AHA, PSO and GA) on 10 datasets (integer, weighted, and not negative graphs) with a variety of the node sizes (10 - 297 nodes). The results have proven that the efficiency of the suggested methods is promising as well as competing with other approaches.

Scopus Crossref
View Publication
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Simplified Novel Approach for Accurate Employee Churn Categorization using MCDM, De-Pareto Principle Approach, and Machine Learning
...Show More Authors

Churning of employees from organizations is a serious problem. Turnover or churn of employees within an organization needs to be solved since it has negative impact on the organization. Manual detection of employee churn is quite difficult, so machine learning (ML) algorithms have been frequently used for employee churn detection as well as employee categorization according to turnover. Using Machine learning, only one study looks into the categorization of employees up to date.  A novel multi-criterion decision-making approach (MCDM) coupled with DE-PARETO principle has been proposed to categorize employees. This is referred to as SNEC scheme. An AHP-TOPSIS DE-PARETO PRINCIPLE model (AHPTOPDE) has been designed that uses 2-stage MCDM s

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Sep 30 2019
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Certain Assessment of Using MWCNT Nps in Drilling Fluid to Mitigate Stick-Slip Problem during Drilling Operation System
...Show More Authors

   Stick- slip is the continuous stopping& release of the Bit/BHA due to the irregular down-hole rotation prompted by the existing relationship between the friction torque and the torque applied from the surface to free the bit.

   Friction coefficient between BHA and wellbore is the main player of stick slip amount, which can be mitigated by support a good lubricators as additives in drilling mud.

   Mathematical (or empirical) solves should be done through adjusting all parameters which supposed to reduce stick- slip as low as possible using different models, one of the main parameters is drilling mud. As per Nanoparticles drilling fluid is a new technology that offers high performance

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Sep 08 2006
Journal Name
Journal Of Engineering
INFLUENCE OF DEFECT IN THE CONCRETE PILES USING NON-DESTRUCTIVE TESTING
...Show More Authors

This paper presents the results of experimental investigation carried out on concrete model piles to study the behaviour of defective piles. This was achieved by employing non-destructive tests using ultrasonic waves. It was found that the reduction in pile stiffness factor is found to be about (26%) when the defect ratio increased from (5%) to (15%). The modulus of elasticity reduction factor as well as the dynamic modulus of elasticity reduction factor increase with the defect ratio

Publication Date
Sat Sep 09 2017
Journal Name
International Journal Of Science And Research (ijsr)
Fingerprints Recognition Using the Local Energy Distribution over Haar Wavelet Subbands
...Show More Authors

Fingerprints are commonly utilized as a key technique and for personal recognition and in identification systems for personal security affairs. The most widely used fingerprint systems utilizing the distribution of minutiae points for fingerprint matching and representation. These techniques become unsuccessful when partial fingerprint images are capture, or the finger ridges suffer from lot of cuts or injuries or skin sickness. This paper suggests a fingerprint recognition technique which utilizes the local features for fingerprint representation and matching. The adopted local features have determined using Haar wavelet subbands. The system was tested experimentally using FVC2004 databases, which consists of four datasets, each set holds

... Show More
View Publication
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Osmotic Membrane Bioreactor for Oily Wastewater Treatment using External & Internal Configurations
...Show More Authors

The present work aims to study the treatment of oily wastewater by means of forward osmosis membrane bioreactor process. Side stream (external) configuration and submerged (internal) configuration of osmotic membrane bioreactor were performed and investigated. The experimental work for each configuration was carried out continuously over 21 days. The flux behavior of forward osmosis membrane in an osmotic membrane bioreactor (OMBR) was investigated, using NaCl as the draw solution and CTA as FO membrane. The effect of mixed liquor suspended solids (MLSS) concentration and TDS accumulation of bioreactor on water flux and membrane fouling behaviors was detected. The accumulation and rejection of nutrients in the bioreactor (Nitrate, COD,

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Removal of Heavy Metals from Industrial Wastewater by Using RO Membrane
...Show More Authors

Industrial wastewater containing nickel, lead, and copper can be produced by many industries. The reverse osmosis (RO) membrane technologies are very efficient for the treatment of industrial wastewater containing nickel, lead, and copper ions to reduce water consumption and preserving the environment. Synthetic industrial wastewater samples containing Ni(II), Pb(II), and Cu(II) ions at various concentrations (50 to 200 ppm), pressures (1 to 4 bar), temperatures (10 to 40 oC), pH (2 to 5.5), and flow rates (10 to 40 L/hr), were prepared and subjected to treatment by RO system in the laboratory. The results showed that high removal efficiency of the heavy metals could be achieved by RO process (98.5%, 97.5% and 96% for Ni(II),

... Show More
View Publication Preview PDF
Publication Date
Thu Mar 31 2016
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Extraction of Phenol from Aqueous Solutions Using Bulk ionic Liquid Membranes
...Show More Authors

Room temperature ionic liquids show potential as an alternative to conventional organic membrane solvents mainly due to their properties of low vapour pressure, low volatility and they are often stable. In the present work, the technical feasibilities of room temperature ionic liquids as bulk liquid membranes for phenol removal were investigated experimentally. In this research several hydrophobic ionic liquids were synthesized at laboratory. These ionic liquids include (1-butyl-3-methylimidazolium bis (trifluoromethylsulfonyl) imide[Bmim][NTf2], 1-Hexyl-3-methylimidazolium bis (trifluoromethylsulfonyl) imide[Hmim][NTf2], 1-octyl-3-methylimidazolium bis (trifluoromethylsulfonyl)imide[Omim][NTf2],1‐butyl

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Reducing of Corrosion Rate in Boiler Tubes by Using Oxygen Scavengers
...Show More Authors

The corrosion behavior of carbon steel at different temperatures 100,120,140 and 160 Cͦ under different pressures 7,10 and 13 bar in pure distilled water and after adding three types of oxygen scavengers Hydroquinone, Ascorbic acid and Monoethanolamine in different concentrations 40,60 and 80 ppm has been investigated using weight loss method. The carbon steel specimens were immersed in water containing 8.2 ppm dissolved oxygen (DO) by using autoclave. It was found that corrosion behavior of carbon steel was greatly influenced by temperature with high pressure. The corrosion rate decreases, when adding any one of oxygen scavengers. The best results were obtained at a concentration of 80 ppm of each scavenger. It was observed that 

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More