Preferred Language
Articles
/
uBav9ooBVTCNdQwCTsUY
Optimization of chemical oxygen demand removal from petroleum refinery wastewater by electrocoagulation using tubular electrochemical reactor with a novel design
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Nov 14 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Cephalometric evaluation of a sample of Iraqi adults with normal occlusion using tetragon analysis
...Show More Authors

Background: This study aimed to determine the cephalometric values of tetragon analysis on a sample of Iraqi adults with normal occlusion. Material and methods: Forty digital true lateral cephalometric radiographs belong to 20 males and 20 females having normal dental relation were analyzed using AutoCAD program 2009. Descriptive statistics and sample comparison with Fastlicht norms were obtained. Results: The results showed that maxillary and mandibular incisors were more proclined and the maxillary/mandibular planes angle was lower in Iraqi sample than Caucasian sample. Conclusion: It's recommended to use result from this study when using tetragon analysis for Iraqis to get more accurate result.

View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Crossref (2)
Scopus Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Aspac J. Mol. Biol. Biotechnol.
Utilizing waste mango and avocado seeds for highly effective dye removal with activated carbon
...Show More Authors

Activated carbon (AC) is a highly important adsorbent material, as it is a solid form of pure carbon that boasts a porous structure and a large surface area, making it effective for capturing pollutants. Thanks to its exceptional features, AC is widely used for purifying water that is contaminated with odors and removing dyes in a cost-effective manner. A variety of carbonic materials have been employed to prepare AC, and this study aimed to evaluate the suitability of utilizing waste mango and avocado seeds for this purpose, followed by testing their efficacy in removing dye from aqueous solutions. The results indicate that using waste mango and avocado as AC is technically feasible, achieving dye removal percentages of 98% and 93%,

... Show More
Scopus
Publication Date
Thu Dec 01 2022
Journal Name
Journal Of Engineering
Multi-Criteria Optimization for Governmental Projects Priority Ranking Depending on Fuzzified Experts’ Opinion using Hygiene Approach
...Show More Authors

Each organization struggles to exploit each possible opportunity for gaining success and continuing with its work carrier. In this field, organization success can be concluded by fulfilling end user requirements combined with optimizing available resources usage within a specified time and acceptable quality level to gain maximum profit. The project ranking process is governed by the multi-criteria environment, which is more difficult for the governmental organization because other organizations' main target is maximizing profit constrained with available resources. The governmental organization should consider human, social, economic and many more factors. This paper focused on building a multi-criteria optimizing proje

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Jun 09 2020
Journal Name
Article In Journal Of Engineering Science And Technology
English Numbers Recognition Based on Sign Language Using Line-Slope Features and PSO-DBN Optimization Method
...Show More Authors

View Publication
Scopus (3)
Scopus
Publication Date
Sat Nov 01 2025
Journal Name
Construction And Building Materials
Polyalphaolefin as a potential modifying agent for hard asphalt cement: Physical, rheological, and chemical characterization
...Show More Authors

Hard-grade asphalt binders like AC20-30 typically exhibit excessive stiffness, reduced penetration, and compromised workability, necessitating modification before use in paving applications. This study evaluates the efficacy of regular polyalphaolefin (PAO), a synthetic olefin-based lubricant, as a performance-enhancing modifying agent for such binders. AC20-30 was blended with PAO at dosages ranging from 2 wt.% to 10 wt.%, and the modified binders were characterized via penetration, ductility, softening point, and rotational viscosity measurements, alongside advanced rheological and chemical-morphological analyses. Incorporating PAO in AC20-30 asphalt progressively reduced the binder stiffness and enhanced its flexibility, with all modifie

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2023
Journal Name
Journal Européen Des Systèmes Automatisés
Design of a Hybrid Adaptive Controller for Series Elastic Actuators of Robots
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref