Preferred Language
Articles
/
sRZgs4oBVTCNdQwCHKNI
Link and Cost Optimization of FTTH Network Implementation through GPON Technology
...Show More Authors

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Sep 11 2023
Journal Name
Journal Of Chemical Technology & Biotechnology
Modeling and optimization of biodiesel from high free‐fatty‐acid chicken fat by non‐catalytic esterification and mussel‐shell‐catalyzed transesterification
...Show More Authors
Abstract<sec><title>BACKGROUND

In this study, biodiesel was prepared from chicken fat via a transesterification reaction using Mussel shells as a catalyst. Pretreatment of chicken fat was carried out using non‐catalytic esterification to reduce the free fatty acid content from 36.28 to 0.96 mg KOH/g oil using an ethanol/ fat mole ratio equal to 115:1. In the transesterification reaction, the studied variables were methanol: oil mole ratio in the range of (6:1 ‐ 30:1), catalyst loading in the range of (9‐15) wt%, reaction temperature (55‐75 °C), and reaction time (1‐7) h. The heterogeneous alkaline catalyst was greenly synthesized from waste mussel shells throughout a calcin

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Univariate and Simplex Optimization for the Spectrophotometric Determination of Cimetidine and Erythromycin ethylsuccinate Drugs Using Bromothymol Blue Via Ion-Pair Formation
...Show More Authors

    The ion-pair formation method has been applied for the spectrophotometric determination of Cimetidine and Erythromycin ethylsuccinate, in bulk samples and in dosage form. The methods are accurate, simple, rapid, inexpensive and sensitive depending on the extraction of the formed ion-pair with brompthymol blue (BTB) as a chromogenic reagent in chloroform, use phthalate buffer of pH 5.5 and 4.0 for Cimetidine and Erythromycin ethylsuccinate respectively.  The formed complexes show absorbance maxima at 427.5 nm and 414.5 nm for Cimetidine and Erythromycin ethylsuccinate respectively against reagent blank. The calibration graphs are linear in the ranges of 0.5-15 µg.mL-1 with detection limit of 0.222 µg.mL-1 for

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 11 2023
Journal Name
Journal Of Chemical Technology &amp; Biotechnology
Modeling and optimization of biodiesel from high free‐fatty‐acid chicken fat by non‐catalytic esterification and mussel‐shell‐catalyzed transesterification
...Show More Authors
Abstract<sec><title>BACKGROUND

In this study, biodiesel was prepared from chicken fat via a transesterification reaction using Mussel shells as a catalyst. Pretreatment of chicken fat was carried out using non‐catalytic esterification to reduce the free fatty acid content from 36.28 to 0.96 mg KOH/g oil using an ethanol/ fat mole ratio equal to 115:1. In the transesterification reaction, the studied variables were methanol: oil mole ratio in the range of (6:1 ‐ 30:1), catalyst loading in the range of (9‐15) wt%, reaction temperature (55‐75 °C), and reaction time (1‐7) h. The heterogeneous alkaline catalyst was greenly synthesized from waste mussel shells throughout a calcin

... Show More
View Publication
Scopus (3)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Evaluating Roads Network Connectivity for Two Municipalities in Baghdad-Iraq
...Show More Authors

The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstractio

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Block Ciphers Analysis Based on a Fully Connected Neural Network
...Show More Authors

With the development of high-speed network technologies, there has been a recent rise in the transfer of significant amounts of sensitive data across the Internet and other open channels. The data will be encrypted using the same key for both Triple Data Encryption Standard (TDES) and Advanced Encryption Standard (AES), with block cipher modes called cipher Block Chaining (CBC) and Electronic CodeBook (ECB). Block ciphers are often used for secure data storage in fixed hard drives, portable devices, and safe network data transport. Therefore, to assess the security of the encryption method, it is necessary to become familiar with and evaluate the algorithms of cryptographic systems. Block cipher users need to be sure that the ciphers the

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Human Pose Estimation Algorithm Using Optimized Symmetric Spatial Transformation Network
...Show More Authors

Human posture estimation is a crucial topic in the computer vision field and has become a hotspot for research in many human behaviors related work. Human pose estimation can be understood as the human key point recognition and connection problem. The paper presents an optimized symmetric spatial transformation network designed to connect with single-person pose estimation network to propose high-quality human target frames from inaccurate human bounding boxes, and introduces parametric pose non-maximal suppression to eliminate redundant pose estimation, and applies an elimination rule to eliminate similar pose to obtain unique human pose estimation results. The exploratory outcomes demonstrate the way that the proposed technique can pre

... Show More
View Publication Preview PDF
Scopus (1)
Scopus Crossref
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Mon Apr 08 2024
Journal Name
Optical And Quantum Electronics
5G passive optical network employing all optical-OFDM_Hybrid SSMF/FSO
...Show More Authors

In this paper, a new 5G Passive Optical Network (5G-PON) employing all-optical orthogonal frequency division multiplexing (AO-OFDM) is proposed in hybrid bidirectional standard single mode fiber (SSMF)/free space optical (FSO). Additionally, an optical frequency generator (OFG) source is utilized. The proposed model is simulated using VPI photonics software. Analytical modeling and simulations have been conducted for a new approach to generate OFG by cascaded two-frequency modulators and one electro-absorption modulator. A sinusoidal RF signal source is utilized to drive all these modulators. The results reveal that 64 optical multiplexed carriers with a frequency spacing of 30 GHz are generated. These optical carriers have power variations

... Show More
View Publication
Scopus (2)
Scopus Clarivate Crossref