Preferred Language
Articles
/
xBaIBocBVTCNdQwCgi8X
Global solar radiation prediction over North Dakota using air temperature: Development of novel hybrid intelligence model
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Jul 01 2020
Journal Name
International Journal Of Business Data Communications And Networking
Simulated Performance of SCTP and TFRC Over MANETs
...Show More Authors

Mobile ad-hoc networks (MANETs) are composed of mobile nodes communicating through wireless medium, without any fixed centralized infrastructure. Providing quality of service (QoS) support to multimedia streaming applications over MANETs is vital. This paper focuses on QoS support, provided by the stream control transmission protocol (SCTP) and the TCP-friendly rate control (TFRC) protocol to multimedia streaming applications over MANETs. In this study, three QoS parameters were considered jointly: (1) packet delivery ratio (PDR), (2) end-to-end delay, (3) and throughput. Specifically, the authors analyzed and compared the simulated performance of the SCTP and TFRC transport protocols for delivering multimedia streaming over MANETs.

... Show More
View Publication
Crossref (18)
Clarivate Crossref
Publication Date
Sat Oct 01 2022
Journal Name
Lark Journal
The role of metaphor in the embodiment of female images (In the novel by Ludmila Ulitskaya "Sincerely Yours Shurik" as model)
...Show More Authors

The research deals with metaphors as being one of the primary means used by Lyudmila Ulitskaya when writing the novel " Sincerely Yours Shurik ", to form diverse and multifaceted collective female images of representatives of the classic psychological patterns presented in the work. This research reflects the results of the study related to the work of Lyudmila Yevkinevna Ulitskaya, an actress of modern Russian prose. The novel "The Sincerely to You Shorek" is one of Ludmila Ulitskaya's creations (the year of writing - 2003), which, like her other works, is distinguished by a unique presentation style, rich vocabulary, lexical and semantic diversity, and a special style of writing. writer. The main objective of the research is to look at th

... Show More
Publication Date
Fri Nov 15 2024
Journal Name
Iraqi Journal Of Science
Comparison of the Physical Trace of Global Luminosity Emission at Multiwavelength and Star Formation Rates of Luminous Infrared Galaxies Using Extragalactic Distance Scale Techniques
...Show More Authors

This paper aims to study the rate of star formation (SFR) in luminous infrared galaxies at different wavelengths using distance measurement techniques (dl, dm) and to know which methods are the most accurate to determine the rate of star formation as we present through this research the results of the statistical analysis (descriptive statistics) for a sample of luminous infrared galaxies. The data used in this research were collected from the NASA Extragalactic Database (NED) and HYPERLEDA, then used to calculate the star formation rate and indicate the accuracy of the distance methods used (dl, dm). Two methods were tested on Hα, OII, FIR, radio continuum at 1.4 GHz, FUV, NUV, and total (FUV + FIR). The results showed that the dl

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Feb 01 2019
Journal Name
Journal Of The College Of Education For Women
The Historical effect of Conflict between North and South (1945-1995)
...Show More Authors

The Historical effect of Conflict between North and South

View Publication Preview PDF
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Recurrent Stroke Prediction using Machine Learning Algorithms with Clinical Public Datasets: An Empirical Performance Evaluation
...Show More Authors

Recurrent strokes can be devastating, often resulting in severe disability or death. However, nearly 90% of the causes of recurrent stroke are modifiable, which means recurrent strokes can be averted by controlling risk factors, which are mainly behavioral and metabolic in nature. Thus, it shows that from the previous works that recurrent stroke prediction model could help in minimizing the possibility of getting recurrent stroke. Previous works have shown promising results in predicting first-time stroke cases with machine learning approaches. However, there are limited works on recurrent stroke prediction using machine learning methods. Hence, this work is proposed to perform an empirical analysis and to investigate machine learning al

... Show More
View Publication Preview PDF
Scopus (13)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Tue Jun 22 2021
Journal Name
Expert Systems
Hybrid intelligent technology for plant health using the fusion of evolutionary optimization and deep neural networks
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Analysis of Temperature and Residual Stress Distribution in CO2 Laser Welded Aluminum 6061 Plates Using FEM
...Show More Authors

This paper develops a nonlinear transient three-dimensional heat transfer finite element model and a rate independent three-dimensional deformation model, developed for the CO2 laser welding simulations in Al-6061-T6 alloy. Simulations are performed using an indirect coupled thermal-structural method for the process of welding. Temperature-dependent thermal properties of Al-6061-T6, effect of latent heat of fusion, and the convective and radiative boundary conditions are included in the model. The heat input to the model is assumed to be a Gaussian heat source. The finite element code ANSYS12, along with a few FORTRAN subroutines, are employed to obtain the numerical results. The benefit of the proposed methodology is that it

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Photoinduced interfacial charge transfer processes in solar photocatalysis degradation of methylene blue using nanostructured ZnO
...Show More Authors

In this research, design of advanced material for sunlight conversion requires focused research to obtain efficient photocatalytic system. Nanostructured ZnO was synthesized using spin coating technique. The structural, morphological and optical properties of annealed nanostructured ZnO thin film at 390 Co for 3 hours were characterized by x-ray diffraction, atomic force microscope AFM and UV-VIS spectrophotometer. Nanostructured ZnO was applied for removal Methylene Blue (MB) dye from water using sunlight induced photocatalytic process. Overall degradation of MB/ZnO was achieved after 120 minutes of sunlight irradiation while it needs more time for MB alone. The reaction rate constant fit pseudo first order for MB/ZnO degradation was 0.

... Show More
View Publication Preview PDF
Crossref