Preferred Language
Articles
/
wxYDBYcBVTCNdQwCRy0n
Fast and efficient recursive algorithm of Meixner polynomials
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Aug 07 2022
Journal Name
Nanomaterials
Efficient Heat Transfer Augmentation in Channels with Semicircle Ribs and Hybrid Al2O3-Cu/Water Nanofluids
...Show More Authors

Global technological advancements drive daily energy consumption, generating additional carbon-induced climate challenges. Modifying process parameters, optimizing design, and employing high-performance working fluids are among the techniques offered by researchers for improving the thermal efficiency of heating and cooling systems. This study investigates the heat transfer enhancement of hybrid “Al2O3-Cu/water” nanofluids flowing in a two-dimensional channel with semicircle ribs. The novelty of this research is in employing semicircle ribs combined with hybrid nanofluids in turbulent flow regimes. A computer modeling approach using a finite volume approach with k-ω shear stress transport turbulence model was used in these simu

... Show More
View Publication
Scopus (12)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Apr 28 2021
Journal Name
2021 1st Babylon International Conference On Information Technology And Science (bicits)
An Efficient Method for Stamps Verification Using Haar Wavelet Sub-bands with Histogram and Moment
...Show More Authors

View Publication
Scopus (2)
Scopus Crossref
Publication Date
Tue Oct 24 2023
Journal Name
Environmental Engineering Research
Exploring electromembrane extraction and liquid membrane for efficient removal of heavy metals from aqueous solutions: An overview
...Show More Authors

Environmental pollution is experiencing an alarming surge within the global ecosystem, warranting urgent attention. Among the significant challenges that demand immediate resolution, effective treatment of industrial pollutants stands out prominently, which for decades has been the focus of most researchers for sustainable industrial development aiming to remove those pollutants and recover some of them. The liquid membrane (LM) method, specifically electromembrane extraction (EME), offers promise. EME deploys an electric field, reducing extraction time and energy use while staying eco-friendly. However, there's a crucial knowledge gap. Despite strides in understanding and applying EME, optimizing it for diverse industrial pollutant

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Mar 01 2019
Journal Name
Spatial Statistics
Efficient Bayesian modeling of large lattice data using spectral properties of Laplacian matrix
...Show More Authors

Spatial data observed on a group of areal units is common in scientific applications. The usual hierarchical approach for modeling this kind of dataset is to introduce a spatial random effect with an autoregressive prior. However, the usual Markov chain Monte Carlo scheme for this hierarchical framework requires the spatial effects to be sampled from their full conditional posteriors one-by-one resulting in poor mixing. More importantly, it makes the model computationally inefficient for datasets with large number of units. In this article, we propose a Bayesian approach that uses the spectral structure of the adjacency to construct a low-rank expansion for modeling spatial dependence. We propose a pair of computationally efficient estimati

... Show More
View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Sun Mar 05 2017
Journal Name
Baghdad Science Journal
An efficient of Sansevieriatrifasciataplantas biosorbent for the treatment of metal contaminated industrial effluents
...Show More Authors

Sansevieriatrifasciata was studied as a potential biosorbent for chromium, copper and nickel removal in batch process from electroplating and tannery effluents. Different parameters influencing the biosorption process such as pH, contact time, and amount of biosorbent were optimized while using the 80 mm sized particles of the biosorbent. As high as 91.3 % Ni and 92.7 % Cu were removed at pH of 6 and 4.5 respectively, while optimum Cr removal of 91.34 % from electroplating and 94.6 % from tannery effluents was found at pH 6.0 and 4.0 respectively. Pseudo second order model was found to best fit the kinetic data for all the metals as evidenced by their greater R2 values. FTIR characterization of biosorbent revealed the presence of carboxyl a

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (2)
Scopus Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Proposed Algorithm for Steganography
...Show More Authors

Publication Date
Sun Mar 01 2015
Journal Name
Computer Systems Science & Engineering
Parameters' fine tuning of differential evolution algorithm
...Show More Authors

Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par

... Show More
Scopus (7)
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Wed Jan 01 2025
Journal Name
Fusion: Practice And Applications
Enhanced EEG Signal Classification Using Machine Learning and Optimization Algorithm
...Show More Authors

This paper proposes a better solution for EEG-based brain language signals classification, it is using machine learning and optimization algorithms. This project aims to replace the brain signal classification for language processing tasks by achieving the higher accuracy and speed process. Features extraction is performed using a modified Discrete Wavelet Transform (DWT) in this study which increases the capability of capturing signal characteristics appropriately by decomposing EEG signals into significant frequency components. A Gray Wolf Optimization (GWO) algorithm method is applied to improve the results and select the optimal features which achieves more accurate results by selecting impactful features with maximum relevance

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Wasit Journal For Pure Sciences
Honeywords Generation Technique based on Meerkat Clan Algorithm and WordNet
...Show More Authors

The efficiency of the Honeywords approach has been proven to be a significant tool for boosting password security. The suggested system utilizes the Meerkat Clan Algorithm (MCA) in conjunction with WordNet to produce honeywords, thereby enhancing the level of password security. The technique of generating honeywords involves data sources from WordNet, which contributes to the improvement of authenticity and diversity in the honeywords. The method encompasses a series of consecutive stages, which include the tokenization of passwords, the formation of alphabet tokens using the Meerkat Clan Algorithm (MCA), the handling of digit tokens, the creation of unique character tokens, and the consolidation of honeywords. The optimization of t

... Show More
View Publication Preview PDF
Crossref