Preferred Language
Articles
/
FxbSCocBVTCNdQwCOzIy
Design and Implementation of a Scalable RFID-Based Attendance System with an Intelligent Scheduling Technique
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Oct 01 2025
Journal Name
Journal Of Environmental Management
Induced electro-fenton process with a new electrochemical reactor design for tetracycline degradation
...Show More Authors

View Publication
Scopus (2)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Fusion: Practice And Applications
Optimizing Task Scheduling and Resource Allocation in Computing Environments using Metaheuristic Methods
...Show More Authors

Optimizing system performance in dynamic and heterogeneous environments and the efficient management of computational tasks are crucial. This paper therefore looks at task scheduling and resource allocation algorithms in some depth. The work evaluates five algorithms: Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Firefly Algorithm (FA) and Simulated Annealing (SA) across various workloads achieved by varying the task-to-node ratio. The paper identifies Finish Time and Deadline as two key performance metrics for gauging the efficacy of an algorithm, and a comprehensive investigation of the behaviors of these algorithms across different workloads was carried out. Results from the experiment

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
Hiding the Type of Skin Texture in Mice based on Fuzzy Clustering Technique
...Show More Authors

A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T

... Show More
View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Energies
Intensifying the Charging Response of a Phase-Change Material with Twisted Fin Arrays in a Shell-And-Tube Storage System
...Show More Authors

A twisted-fin array as an innovative structure for intensifying the charging response of a phase-change material (PCM) within a shell-and-tube storage system is introduced in this work. A three-dimensional model describing the thermal management with charging phase change process in PCM was developed and numerically analyzed by the enthalpy-porosity method using commercial CFD software. Efficacy of the proposed structure of fins for performing better heat communication between the active heating surface and the adjacent layers of PCM was verified via comparing with conventional longitudinal fins within the same design limitations of fin material and volume usage. Optimization of the fin geometric parameters including the pitch, numb

... Show More
View Publication Preview PDF
Scopus (56)
Crossref (52)
Scopus Clarivate Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Journal Of King Saud University - Computer And Information Sciences
Heuristic initialization of PSO task scheduling algorithm in cloud computing
...Show More Authors

View Publication
Scopus (175)
Crossref (126)
Scopus Clarivate Crossref
Publication Date
Thu Jun 02 2016
Journal Name
Ashrae Transactions
Melting of PCM with nanoparticles in a triplex-tube thermal energy storage system
...Show More Authors

Scopus (29)
Scopus
Publication Date
Thu Sep 01 2016
Journal Name
Applied Thermal Engineering
Solidification of a PCM with nanoparticles in triplex-tube thermal energy storage system
...Show More Authors

Crossref (168)
Crossref
Publication Date
Thu Sep 01 2016
Journal Name
Applied Thermal Engineering
Solidification of a PCM with nanoparticles in triplex-tube thermal energy storage system
...Show More Authors

View Publication
Scopus (166)
Crossref (168)
Scopus Clarivate Crossref
Publication Date
Fri Aug 13 2021
Journal Name
Journal Européen Des Systèmes Automatisés
Proxy-based sliding mode vibration control with an adaptive approximation compensator for euler-bernoulli smart beams
...Show More Authors

Proxy-based sliding mode control PSMC is an improved version of PID control that combines the features of PID and sliding mode control SMC with continuously dynamic behaviour. However, the stability of the control architecture maybe not well addressed. Consequently, this work is focused on modification of the original version of the proxy-based sliding mode control PSMC by adding an adaptive approximation compensator AAC term for vibration control of an Euler-Bernoulli beam. The role of the AAC term is to compensate for unmodelled dynamics and make the stability proof more easily. The stability of the proposed control algorithm is systematically proved using Lyapunov theory. Multi-modal equation of motion is derived using the Galerkin metho

... Show More
Crossref (2)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref