Preferred Language
Articles
/
nBYA8ooBVTCNdQwCyLdR
Treatment of petroleum refinery wastewater by electrofenton process using a low cost porous graphite air-diffusion cathode with a novel design
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
Linear and Non-Linear Stability Analysis for Thermal Convection in A Bidispersive Porous Medium with Thermal Non-Equilibrium Effects: Linear and non-linear stability analysis
...Show More Authors

     The linear instability and nonlinear stability analyses are performed for the model of bidispersive local thermal non-equilibrium flow. The effect of local thermal non-equilibrium on the onset of convection in a bidispersive porous medium of Darcy type is investigated.  The temperatures in the macropores and micropores are allowed to be different. The effects of various interaction parameters on the stability of the system are discussed. In particular, the effects of the porosity modified conductivity ratio parameters,  and , with the int

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Feb 12 2019
Journal Name
Iraqi Journal Of Laser
Design and Implementation Tunable Band Pass Filter based on PCF-Air Micro-cavity FBG Fabry-Perot Resonator
...Show More Authors

A tunable band pass filter based on fiber Bragg grating sensor using an in-fiber Mach-Zender interferometer with dual micro-cavities is presented. The micro-cavity was formed by splicing together a conventional single-mode fiber and a solid core photonic crystal fiber (SCPCF) with simple arc discharge technique. Different parameters such as arc power, length of the SCPCF and the overlap gap between samples were considered to control the fabrication process. The ellipsoidal air-cavity between the two fibers forms Fabry-Perot cavity. The diffraction loss was very low due to short cavity length. Ellipsoidal shape micro-cavities were experimentally achieved parallel to the propagation axis having dimensions of (24.92 – 62.32) μm of width

... Show More
View Publication Preview PDF
Publication Date
Sat Jun 01 2024
Journal Name
Results In Materials
Fabrication and characterization of mesoporous calcium silicate and silver-incorporated mesoporous calcium silicate nanoparticles with low cytotoxicity and antibacterial properties as a dental biomaterial
...Show More Authors

View Publication Preview PDF
Scopus Crossref
Publication Date
Sun Oct 01 2017
Journal Name
Applied Energy
Hourly yield prediction of a double-slope solar still hybrid with rubber scrapers in low-latitude areas based on the particle swarm optimization technique
...Show More Authors

View Publication
Scopus (29)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Mon Aug 26 2019
Journal Name
Iraqi Journal Of Science
Treatment isolated fungi from laboratory tools in some Baghdad hospitals by using biosynthesized nanoparticles
...Show More Authors

The study aims to biosynthesized of sliver nanoparticle from aqueous extract of olive leave and evaluate the effectiveness of the synthesis AgNPs against isolated fungi. The study mediating fifty samples were taken from various tools in laboratory from five hospitals in Baghdad. Four species of fungi were identified depending on the morphological and microscopic characteristics. The most common isolated fungi based on their frequency ratio were as follows Aspergillus niger 87.5%, Aspergillus flavus 62.5%, Aspergillus fumigatus 53.5% and Aspergillus nidulans 37.7%.The Biosynthesis of silver nanoparticle developed a rapid, eco-friendly and convenient green method for the stable silver nanoparticles (AgNP

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Study the Physicochemical Characteristics of the Treatment Wastewater of AL-Rasheed Factory for Vegetable Oils –Baghdad
...Show More Authors

  This research presents the results of the tests of the physical, chemical and biological treatments performed on the industrial effluent of Al-Rashid Factory for vegetable oils during January to July, 2010.      Some environmental parameters such as temperature, electrical conductivity(ec), Biological oxygen demand(bod), chemical oxygen demand(cod), total suspended solids(tss), dissolved oxygen(o2) and total dissolved solids(tdc) have been investigated. The study shows that the industrial effluent contains a percent of organic pollution and in different values, and that it is responsible for the (bod), which records (5.15-67)ppm, while the (cod) ranges between (25-170.5)ppm, the (ec) values range between (

... Show More
View Publication Preview PDF