Preferred Language
Articles
/
ohfwL48BVTCNdQwCcV5l
An Enhanced Evolutionary Algorithm for Detecting Complexes in Protein Interaction Networks with Heuristic Biological Operator
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Feb 14 2024
Journal Name
Russian Journal Of General Chemistry
Preparation, Characterization, and Biological Activity of Mixed Schiff Base Ligand Complexes with Amino Acid L-Proline
...Show More Authors

View Publication
Scopus (10)
Crossref (10)
Scopus Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Synthesis, Characterization and Biological Evaluation of New Dithiocarbamate Ligand and Its Complexes with some Metal Ions
...Show More Authors

New bidentate dithiocarbamate ligand (NaL) namely [Sodium-2-(((3-methyl -4- “(2,2,2-tri fluoro ethoxy) pyridin-2”-yl) methyl) sulfinyl)-1H-benzoimidazole -1-carbodithioate] was prepared. This free ligand was synthesized from the reaction of a (RS)-2-([3-methyl -4-(2,2,2-tri fluoroethoxy) pyridin-2-yl] methyl sulfinyl)-1H benzoimidazole, CS2 and NaOH in methanol as solvent. From reaction of dithiocarbamate salt (NaL) with metal ions (M); Co(II), Ni(II), Cu(II), Zn(II), Cd(II) and Pd(II)”, have obtained the DTC complexes at general molecular formula [M(L)2(H2O)2] and [Pd(L)2]. To characterize the ligand and its complexes, used different analyses methods such FTIR, UV-Vis, elemental microanalysis, atomic absoreption, magnetic susceptibil

... Show More
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
Ciphered Text Hiding in an Image using RSA algorithm
...Show More Authors

In this paper, a method for hiding cipher text in an image file is introduced . The
proposed method is to hide the cipher text message in the frequency domain of the image.
This method contained two phases: the first is embedding phase and the second is extraction
phase. In the embedding phase the image is transformed from time domain to frequency
domain using discrete wavelet decomposition technique (Haar). The text message encrypted
using RSA algorithm; then Least Significant Bit (LSB) algorithm used to hide secret message
in high frequency. The proposed method is tested in different images and showed success in
hiding information according to the Peak Signal to Noise Ratio (PSNR) measure of the the
original ima

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Bat Algorithm Based an Adaptive PID Controller Design for Buck Converter Model
...Show More Authors

The aim of this paper is to design a PID controller based on an on-line tuning bat optimization algorithm for the step-down DC/DC buck converter system which is used in the battery operation of the mobile applications. In this paper, the bat optimization algorithm has been utilized to obtain the optimal parameters of the PID controller as a simple and fast on-line tuning technique to get the best control action for the system. The simulation results using (Matlab Package) show the robustness and the effectiveness of the proposed control system in terms of obtaining a suitable voltage control action as a smooth and unsaturated state of the buck converter input voltage of ( ) volt that will stabilize the buck converter sys

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Efficient Algorithm for Fuzzy Linear Fractional Programming Problems via Ranking Function
...Show More Authors

In many applications such as production, planning, the decision maker is important in optimizing an objective function that has fuzzy ratio two functions which can be handed using fuzzy fractional programming problem technique. A special class of optimization technique named fuzzy fractional programming problem is considered in this work when the coefficients of objective function are fuzzy. New ranking function is proposed and used to convert the data of the fuzzy fractional programming problem from fuzzy number to crisp number so that the shortcoming when treating the original fuzzy problem can be avoided. Here a novel ranking function approach of ordinary fuzzy numbers is adopted for ranking of triangular fuzzy numbers with simpler an

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
2018 Third Scientific Conference Of Electrical Engineering (scee)
An Intelligent Cognitive System Design for Mobile Robot based on Optimization Algorithm
...Show More Authors

View Publication
Scopus (8)
Scopus Crossref
Publication Date
Mon Feb 27 2023
Journal Name
Applied Sciences
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
...Show More Authors

Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. In response to these threats, machine learning (ML) and deep learning (DL) have emerged as effective approaches for quickly identifying and mitigating anomalies. To this end, this research employs various classification methods, including support vector machines (SVMs), K-nearest neighbors (KNNs), decision trees (DTs), multiple layer perceptron (MLP), and convolutional neural networks (CNNs), and compares their performance. CNN exhibits the highest train accuracy at 97.808%, yet the lowest prediction accuracy at 90.08%. In contrast, SVM demonstrates the highest prediction accuracy of 95.5%. As such, an

... Show More
View Publication
Scopus (61)
Crossref (54)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Laboratory Testing and Evaluating of Shale Interaction with Mud for Tanuma Shale formation in Southern Iraq
...Show More Authors

   Rock failure during drilling is an important problem to be solved in petroleum technology. one of the most causes of rock failure is shale chemical interaction with drilling fluids. This interaction is changing the shale strength as well as its pore pressure relatively near the wellbore wall. In several oilfields in southern Iraq, drilling through the Tanuma formation is known as the most challenging operation due to its unstable behavior. Understanding the chemical reactions between shale and drilling fluid is determined by examining the features of shale and its behavior with drilling mud. Chemical interactions must be mitigated by the selection of suitable drilling mud with effective chemical additives. This study is describing t

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Applied Sciences
A Hybrid Artificial Intelligence Model for Detecting Keratoconus
...Show More Authors

Machine learning models have recently provided great promise in diagnosis of several ophthalmic disorders, including keratoconus (KCN). Keratoconus, a noninflammatory ectatic corneal disorder characterized by progressive cornea thinning, is challenging to detect as signs may be subtle. Several machine learning models have been proposed to detect KCN, however most of the models are supervised and thus require large well-annotated data. This paper proposes a new unsupervised model to detect KCN, based on adapted flower pollination algorithm (FPA) and the k-means algorithm. We will evaluate the proposed models using corneal data collected from 5430 eyes at different stages of KCN severity (1520 healthy, 331 KCN1, 1319 KCN2, 1699 KCN3 a

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
Properties of the Adjoint Operator of a General Fuzzy Bounded Operator
...Show More Authors

Our goal in the present paper is to recall the concept of general fuzzy normed space and its basic properties in order to define the adjoint operator of a general fuzzy bounded operator from a general fuzzy normed space V into another general fuzzy normed space U. After that basic properties of the adjoint operator were proved then the definition of fuzzy reflexive general fuzzy normed space was introduced in order to prove that every finite dimensional general fuzzy normed space is fuzzy reflexive.

View Publication
Scopus (10)
Crossref (2)
Scopus Clarivate Crossref