Preferred Language
Articles
/
iobcdIYBIXToZYALkopn
Neural network modeling of rutting performance for sustainable asphalt mixtures modified by industrial waste alumina
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
Improving Some Mechanical Properties and Thermal conductivity of PMMA Polymer by using Environmental Waste
...Show More Authors

This study was achieved to satisfy two goals, the first of which is to treat an environmental problem represented by the disposal of date seeds, and the second is the use of these wastes to improve some mechanical and thermal properties of poly methyl methacrylate PMMA through strengthening different proportions of the powder of date seeds.

Particles of date seeds were used as a natural strengthening material for PMMA polymer, by mixing the matrix material (resin) with the hardener while still stirring continuously for a period of 10 min. After that, the samples of the reinforced material were prepared by adding the powder of date seeds, which is the reinforcing substance, with different percentages of weight fraction (0, 0.5, 1,

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Iraqi Journal Of Physics
Immobilization of Nuclear Waste Using Carbon Nanotubes Prepared by Laser Ablation in Liquid Method
...Show More Authors

In an attempt to disposal from nuclear waste which threats our health and environments. Therefore we have to find appropriate method to immobilize nuclear waste. So, in this research the nuclear waste (Strontium hydroxide) was immobilized by Carbon nanotubes (CNTs).  The Nd-YAG laser with wave length 1064 nm, energy 750 mJ and 100 pulses used to prepare CNTs. After that adding Sr(HO)2 powder to the CNTs colloidal in calculated rate to get homogenous mixing of CNTs-Sr(OH)2. The Sr(HO)2 absorbs carbon dioxide from the air to form strontium carbonate so, the  new solution is CNTs-SrCO3. To dry solution putting three drops from the new solution on the glass slides. To investigate the radi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Thu Apr 13 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

 This paper argues the accuracy of behavior based detection systems, in which the Application Programming Interfaces (API) calls are analyzed and monitored. The work identifies the problems that affecting the accuracy of such detection models. The work was extracted (4744) API call through analyzing. The new approach provides an accurate discriminator and can reveal malicious API in PE malware up to 83.2%. Results of this work evaluated with Discriminant Analysis

View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Ibn Al-haitham Jour. For Pure & Appl. Sci.
Reducing False Notification in Identifying Malicious Application Programming Interface(API) to Detect Malwares Using Artificial Neural Network with Discriminant Analysis
...Show More Authors

Publication Date
Thu Oct 20 2022
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Solving of the Quadratic Fractional Programming Problems by a Modified Symmetric Fuzzy Approach
...Show More Authors

The aims of the paper are to present a modified symmetric fuzzy approach to find the best workable compromise solution for quadratic fractional programming problems (QFPP) with fuzzy crisp in both the objective functions and the constraints. We introduced a modified symmetric fuzzy by proposing a procedure, that starts first by converting the quadratic fractional programming problems that exist in the objective functions to crisp numbers and then converts the linear function that exists in the constraints to crisp numbers. After that, we applied the fuzzy approach to determine the optimal solution for our quadratic fractional programming problem which is supported theoretically and practically. The computer application for the algo

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Apr 26 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Removal of Birlliant Green Dye From Aqueous Solution by Adsorption Onto Modified Clay
...Show More Authors

 Application of a Fe-bentonite nano clay (Fe-BNC) as modified clay has been investigated for the removal of birlliant green (BG) from aqueous solutions. Atomic force microscope measurements give a detailed information on pore shape and pore size distribution about the clay. These measurements show that the average diameter of the improved clay is 346.84 nm. Batch adsorption experiments were carried out for the removal of (BG) from aqueous solutions onto Fe-BNC.       Equilibrium data were fitted to Freundlich and Langmuir isotherm equations and the isotherm constants were determined. Thermodynamic parameters such as free energy, entropy and enthalpy, have been calculated.     &n

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 02 2012
Journal Name
Baghdad Science Journal
Stability of Back Propagation Training Algorithm for Neural Networks
...Show More Authors

In this paper, we derive and prove the stability bounds of the momentum coefficient µ and the learning rate ? of the back propagation updating rule in Artificial Neural Networks .The theoretical upper bound of learning rate ? is derived and its practical approximation is obtained

View Publication Preview PDF
Crossref
Publication Date
Sun Jan 30 2022
Journal Name
Iraqi Journal Of Science
A Modified Advanced Encryption Standard for Color Images
...Show More Authors

     The widespread use of images, especially color images and rapid advancement of computer science, have led to an emphasis on securing these images and defending them against intruders. One of the most popular ways to protect images is to use encryption algorithms that convert data in a way that is not recognized by someone other than the intended user. The Advanced Encryption Standard algorithm (AES) is one of the most protected encryption algorithms. However, due to various types of theoretical and practical assaults, like a statistical attack, differential analysis, and brute force attack, its security is under attack.

In this paper, a modified AES coined as (M-AES) is proposed to improve the efficiency

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Iraqi Journal Of Science
Modified Iterative Method for Solving Sine - Gordon Equations
...Show More Authors

       The basic goal of this research is to utilize an analytical method which is called the Modified Iterative Method in order to gain an approximate analytic solution to the Sine-Gordon equation. The suggested method is the amalgamation of the iterative method and a well-known technique, namely the Adomian decomposition method. A method minimizes the computational size, averts round-off errors, transformation and linearization, or takes some restrictive assumptions. Several examples are chosen to show the importance and effectiveness of the proposed method. In addition, a modified iterative method gives faster and easier solutions than other methods. These solutions are accurate and in agreement with the series

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Mon Jan 13 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Role Of The Industrial Bank Of Iraq In Developing The Industrial Sector
...Show More Authors

The Industrial Banks in most countries in the world plays an essential and vital role in developing the industrial sector due to its effective importance in the economic and social development. The research aims to study the ability of the Industrial Bank of Iraq to the growth and development of the mixed industrial sector companies through loans granted to them. In addition, the research seeks to study credit policies pursued by the Industrial Bank of Iraq to finance the mixed industrial sector companies. The data of the research has been collected from the financial statements of the Industrial Banks of Iraq  for the period 2007-2011, and by means of questionnaire distributed to a sample of the mixed industrial sector companies in

... Show More
View Publication Preview PDF