Preferred Language
Articles
/
QxaJcocBVTCNdQwC90vb
Meteorological data mining and hybrid data-intelligence models for reference evaporation simulation: A case study in Iraq
...Show More Authors

Crossref
View Publication
Publication Date
Wed Apr 14 2021
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Estimation of domestic urban electricity consumption: A case study of Baghdad, Iraq
...Show More Authors

Electricity consumption for household purposes in urban areas widely affects the general urban consumption compared to other commercial and industrial uses, as household electricity consumption is affected by many factors related to the physical aspects of the residential area such as temperature, housing unit area, and coverage ratio, as well as social and economic factors such as family size and income, to reach the extent of the influence of each of the above factors on the amount of electricity consumed for residential uses, a selected sample of a residential area in the city of Baghdad was studied and a field survey conducted of the characteristics of that sample and the results analyzed and modeled statistically in relation to the amo

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Journal Of Sensors
WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs
...Show More Authors

Realizing the full potential of wireless sensor networks (WSNs) highlights many design issues, particularly the trade-offs concerning multiple conflicting improvements such as maximizing the route overlapping for efficient data aggregation and minimizing the total link cost. While the issues of data aggregation routing protocols and link cost function in a WSNs have been comprehensively considered in the literature, a trade-off improvement between these two has not yet been addressed. In this paper, a comprehensive weight for trade-off between different objectives has been employed, the so-called weighted data aggregation routing strategy (WDARS) which aims to maximize the overlap routes for efficient data aggregation and link cost

... Show More
View Publication Preview PDF
Scopus (36)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
State-of-the-Art in Data Integrity and Privacy-Preserving in Cloud Computing
...Show More Authors

Cloud computing (CC) is a fast-growing technology that offers computers, networking, and storage services that can be accessed and used over the internet. Cloud services save users money because they are pay-per-use, and they save time because they are on-demand and elastic, a unique aspect of cloud computing. However, several security issues must be addressed before users store data in the cloud. Because the user will have no direct control over the data that has been outsourced to the cloud, particularly personal and sensitive data (health, finance, military, etc.), and will not know where the data is stored, the user must ensure that the cloud stores and maintains the outsourced data appropriately. The study's primary goals are to mak

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Keratoconus Severity Detection From Elevation, Topography and Pachymetry Raw Data Using a Machine Learning Approach
...Show More Authors

View Publication
Scopus (22)
Crossref (20)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Development a Statistical Relationship between Compressional Wave Velocity and Petrophysical Properties from Logs Data for JERIBE Formation ASMARI Reservoir in FAUQI Oil Field
...Show More Authors

   The Compressional-wave (Vp) data are useful for reservoir exploration, drilling operations, stimulation, hydraulic fracturing employment, and development plans for a specific reservoir. Due to the different nature and behavior of the influencing parameters, more complex nonlinearity exists for Vp modeling purposes. In this study, a statistical relationship between compressional wave velocity and petrophysical parameters was developed from wireline log data for Jeribe formation in Fauqi oil field south Est Iraq, which is studied using single and multiple linear regressions. The model concentrated on predicting compressional wave velocity from petrophysical parameters and any pair of shear waves velocity, porosity, density, and

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Development a Statistical Relationship between Compressional Wave Velocity and Petrophysical Properties from Logs Data for JERIBE Formation ASMARI Reservoir in FAUQI Oil Field
...Show More Authors

   The Compressional-wave (Vp) data are useful for reservoir exploration, drilling operations, stimulation, hydraulic fracturing employment, and development plans for a specific reservoir. Due to the different nature and behavior of the influencing parameters, more complex nonlinearity exists for Vp modeling purposes. In this study, a statistical relationship between compressional wave velocity and petrophysical parameters was developed from wireline log data for Jeribe formation in Fauqi oil field south Est Iraq, which is studied using single and multiple linear regressions. The model concentrated on predicting compressional wave velocity from petrophysical parameters and any pair of shear waves velocity, porosity, density, a

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics
...Show More Authors

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Fri Jan 21 2022
Journal Name
Environmental Science And Pollution Research
Development of new computational machine learning models for longitudinal dispersion coefficient determination: case study of natural streams, United States
...Show More Authors

View Publication
Crossref (31)
Crossref
Publication Date
Mon Sep 30 2019
Journal Name
College Of Islamic Sciences
Cognitive dimensions For grammar work at Sibweh In light of the data of the speech
...Show More Authors

The Arabic grammatical theory is characterized by the characteristics that distinguish it from other languages. It is based on the following equation: In its entirety a homogeneous linguistic system that blends with the social nature of the Arab, his beliefs, and his culture.
    This means that this theory was born naturally, after the labor of maintaining an integrated inheritance, starting with its legal text (the Koran), and ends with its features of multiple attributes.
Saber was carrying the founding crucible of that theory, which takes over from his teacher, Hebron, to be built on what it has reached. It is redundant to point to his location and the status of his book.
So came to my research tagged: (c

... Show More
View Publication Preview PDF