Preferred Language
Articles
/
wxdWPo4BVTCNdQwCEj4x
Mining categorical Covid-19 data using chi-square and logistic regression algorithms
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed May 10 2023
Journal Name
Journal Of Engineering
DOUBLE DIFFUSIVE FREE CONVECTION IN A PACKED BED SQUARE ENCLOSURE BY USING LOCAL THERMAL NON-EQUILIBRIUM (LTNE) MODEL
...Show More Authors

In the present study, free convection heat and mass transfer of fluid in a square packed bed enclosure is numerically investigated. For the considered geometrical shape, the left vertical wall of enclosure was assumed to be kept at high temperature and concentration while the opposite wall was kept at low temperature and concentration with insulating both the top and bottom walls of enclosure. The Brinkman– Forchheimer extended Darcy model was used to solve the momentum equations, while the energy equations for fluid and solid phases were solved by using the local thermal non-equilibrium (LTNE) model.Computations are performed for a range of the Darcy number from 10-5 to 10-1, the porosity from 0.5 to 0.9, and buoyancy ratio from -15 t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Petroleum And Coal
Analyzing of Production Data Using Combination of empirical Methods and Advanced Analytical Techniques
...Show More Authors

Scopus (1)
Scopus
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Advances In Science, Technology And Engineering Systems Journal
Bayes Classification and Entropy Discretization of Large Datasets using Multi-Resolution Data Aggregation
...Show More Authors

Big data analysis has important applications in many areas such as sensor networks and connected healthcare. High volume and velocity of big data bring many challenges to data analysis. One possible solution is to summarize the data and provides a manageable data structure to hold a scalable summarization of data for efficient and effective analysis. This research extends our previous work on developing an effective technique to create, organize, access, and maintain summarization of big data and develops algorithms for Bayes classification and entropy discretization of large data sets using the multi-resolution data summarization structure. Bayes classification and data discretization play essential roles in many learning algorithms such a

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Nov 01 2015
Journal Name
Journal Of Engineering
Natural and Mixed Convection in Square Vented Enclosure Filled with Metal Foam
...Show More Authors

Steady natural and mixed convection flow in a square vented enclosure filled with water-saturated aluminum metal foam is numerically investigated. The left vertical wall is kept at constant temperature and the remaining walls are thermally insulated. Forced convection is imposed by providing an inlet at cavity bottom surface, and a vent at the top surface. Natural convection takes place due to the temperature difference inside the enclosure. Darcy-Brinkman-Forchheimer model for fluid flow and the two-equation of the local thermal non-equilibrium model for heat flow was adopted to describe the flow characteristics within the porous cavity. Numerical results are obtained for a wide range of width of the inlet as a fraction

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Regression Analysis Models to Predict the 28 -day Compressive Strength Using Accelerated Curing Tests
...Show More Authors

Regression analysis models are adopted by using SPSS program to predict the 28-day compressive strength as dependent variable and the accelerated compressive strength as independent variable. Three accelerated curing method was adopted, warm water (35ºC) and autogenous according to ASTM C C684-99 and the British method (55ºC) according to BS1881: Part 112:1983. The experimental concrete mix design was according to ACI 211.1. Twenty eight concrete mixes with slump rang (25-50) mm and (75-100)mm for rounded and crushed coarse aggregate with cement content (585, 512, 455, 410, 372 and 341)Kg/m3.

      The experimental results showed that the acc

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
2020 8th Ieee Ras/embs International Conference For Biomedical Robotics And Biomechatronics (biorob)
Estimating Wrist Joint Torque Using Regression Ensemble of Bagged Trees under Multiple Wrist Postures
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Studies In Systems, Decision And Control
Gap Analysis by Readiness Review Including Online Learning During COVID-19 Pandemic Period for Engineering Programs at the College of Engineering—University of Baghdad
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
A Lightweight Image Encryption Algorithm Based on Elliptic Curves and a 5D Logistic Map
...Show More Authors

    Cryptography can be thought of as a toolbox, where potential attackers gain access to various computing resources and technologies to try to compute key values. In modern cryptography, the strength of the encryption algorithm is only determined by the size of the key. Therefore, our goal is to create a strong key value that has a minimum bit length that will be useful in light encryption. Using elliptic curve cryptography (ECC) with Rubik's cube and image density, the image colors are combined and distorted, and by using the Chaotic Logistics Map and Image Density with a secret key, the Rubik's cubes for the image are encrypted, obtaining a secure image against attacks. ECC itself is a powerful algorithm that generates a pair of p

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 15 2025
Journal Name
Al-rafidain University College For Sciences
“Simple Regression Analysis by using Linear Programming Technique and illustration of Absolute Residuals method with another Estimation Techniques”
...Show More Authors

This research deals with unusual approach for analyzing the Simple Linear Regression via Linear Programming by Two - phase method, which is known in Operations Research: “O.R.”. The estimation here is found by solving optimization problem when adding artificial variables: Ri. Another method to analyze the Simple Linear Regression is introduced in this research, where the conditional Median of (y) was taken under consideration by minimizing the Sum of Absolute Residuals instead of finding the conditional Mean of (y) which depends on minimizing the Sum of Squared Residuals, that is called: “Median Regression”. Also, an Iterative Reweighted Least Squared based on the Absolute Residuals as weights is performed here as another method to

... Show More
View Publication Preview PDF