Preferred Language
Articles
/
OBf_W5IBVTCNdQwCqK1P
Implementation of Univariate Paradigm for Streamflow Simulation Using Hybrid Data-Driven Model: Case Study in Tropical Region
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Oct 02 2022
Journal Name
Engineering, Technology & Applied Science Research
Statistical Modeling for Traffic Noise: The Case of Kirkuk City
...Show More Authors

The auditory system can suffer from exposure to loud noise and human health can be affected. Traffic noise is a primary contributor to noise pollution. To measure the noise levels, 3 variables were examined at 25 locations. It was found that the main factors that determine the increase in noise level are traffic volume, vehicle speed, and road functional class. The data have been taken during three different periods per day so that they represent and cover the traffic noise of the city during heavy traffic flow conditions. Analysis of traffic noise prediction was conducted using a simple linear regression model to accurately predict the equivalent continuous sound level. The difference between the predicted and the measured noise shows that

... Show More
View Publication
Crossref (5)
Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (32)
Crossref (18)
Scopus Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Environmental Pollution
Prediction of sediment heavy metal at the Australian Bays using newly developed hybrid artificial intelligence models
...Show More Authors

View Publication
Crossref (118)
Crossref
Publication Date
Sat Sep 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Spatial Data Analysis for Geostatistical Modeling of Petrophysical Properties for Mishrif Formaiton, Nasiriya Oil Field
...Show More Authors

Spatial data analysis is performed in order to remove the skewness, a measure of the asymmetry of the probablitiy distribution. It also improve the normality, a key concept of statistics from the concept of normal distribution “bell shape”, of the properties like improving the normality porosity, permeability and saturation which can be are visualized by using histograms. Three steps of spatial analysis are involved here; exploratory data analysis, variogram analysis and finally distributing the properties by using geostatistical algorithms for the properties. Mishrif Formation (unit MB1) in Nasiriya Oil Field was chosen to analyze and model the data for the first eight wells. The field is an anticline structure with northwest- south

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2015
Journal Name
Al-khwarizmi Engineering Journal
Prediction of Performance Equations for Household Compressors Depending on Manufacturing Data for Refrigerators and Freezers
...Show More Authors

Abstract

 A surface fitting model is developed based on calorimeter data for two famous brands of household compressors. Correlation equations of ten coefficient polynomials were found as a function of refrigerant saturating and evaporating temperatures in range of (-35℃ to -10℃) using Matlab software for cooling capacity, power consumption, and refrigerant mass flow rate.

Additional correlations equations for these variables as a quick choice selection for a proper compressor use at ASHRAE standard that cover a range of swept volume range (2.24-11.15) cm3.

The result indicated that these surface fitting models are accurate with in ± 15% for 72 compressors model of cooling cap

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 11 2022
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Rheological Investigation of Lipid Polymer Hybrid Nanocarriers for Oral Delivery of Felodipine (Conference Paper )#
...Show More Authors

The rheological behavior among factors that are present in Stokes law can be used to control the stability of the colloidal dispersion system. The felodipine lipid polymer hybrid nanocarriers  (LPHNs) is an interesting colloidal dispersion system that is used for rheological characteristic analysis. The LPHNs compose of polymeric components and lipids. This research aims to prepare oral felodipine LPHNs to investigate the effect of independent variables on the rheological behavior of the nanosystem. The microwave-based technique was used to prepare felodipine LPHNs (H1-H9) successfully. All the formulations enter the characterization process for particle size and PDI to ascertain the colloidal properties of the prepared nanosystem t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 28 2023
Journal Name
International Journal Of Intelligent Engineering And Systems
Design and Implementation of EEG-Based Smart Structure
...Show More Authors

View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Thu Jun 29 2023
Journal Name
Wasit Journal For Pure Sciences
Suitable Methods for Solving COVID-19 Model in Iraq
...Show More Authors

Because the Coronavirus epidemic spread in Iraq, the COVID-19 epidemic of people quarantined due to infection is our application in this work. The numerical simulation methods used in this research are more suitable than other analytical and numerical methods because they solve random systems. Since the Covid-19 epidemic system has random variables coefficients, these methods are used. Suitable numerical simulation methods have been applied to solve the COVID-19 epidemic model in Iraq. The analytical results of the Variation iteration method (VIM) are executed to compare the results. One numerical method which is the Finite difference method (FD) has been used to solve the Coronavirus model and for comparison purposes. The numerical simulat

... Show More
View Publication Preview PDF
Crossref