Preferred Language
Articles
/
aReUP48BVTCNdQwCjGYL
A New Hybrid Feature Selection Method Using T-test and Fitness Function
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Simulation of Temperature Distribution in TIG Spot Welds of (Al-Mg) Alloy Using Finite Element Method
...Show More Authors

      This research concern to analyse and simulate the temperature distribution in the spot welding joints using tungsten arc welding shielded with inert gas (TIG Spot) for the aluminum-magnesium alloy type  (5052-O).

      The effect of and the quantity of the heat input that enter the weld zone has been investigated welding current, welding time and arc length on temperature distribution. The finite element method (by utilizing programme ANSYS 5.4) is presented  the temperature distribution in a circular weld pool and the weld pool penetration (depth of welding) through the top sheet ,across the interface into the lower sheet forming a weld spot.   &nbs

... Show More
View Publication Preview PDF
Publication Date
Fri Jan 01 2016
Journal Name
The Journal Of The College Of Basic Education
Polymorphism of IL-4 -590 (C>T) gene in Iraqi children with Type 1 Diabetes Mellitus
...Show More Authors

This study included 50 blood serum samples that collected from children with age ranged between 7-12 years. Thirty five samples collected from children with Type 1 Diabetes Mellitus (T1D), and 15 blood serum samples collected from healthy children as a control sample. The polymorphism of IL-4 -590 (C>T) gene, which amplified by using amplification refractory mutation system (ARMS-PCR) was showed high percentage of C allele frequency in T1D patients sample in comparison with T allele frequency, and the C allele revealed as etiological faction with risk by having T1D disease, whereas the T allele showed high frequency from the C allele frequency in control sample, and the T allele revealed as preventive faction from infection by this disease.

... Show More
Preview PDF
Publication Date
Sun Dec 06 2015
Journal Name
Baghdad Science Journal
Bounded Solutions of the Second Order Differential Equation x ?+f(x) x ?+g(x)=u(t)
...Show More Authors

In this paper we prove the boundedness of the solutions and their derivatives of the second order ordinary differential equation x ?+f(x) x ?+g(x)=u(t), under certain conditions on f,g and u. Our results are generalization of those given in [1].

View Publication Preview PDF
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (9)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Nano Hybrids And Composites
OLED Hybrid Light Emitting Devices with ZnS QDs, TPBi and Alq3 Electron Transport Layers
...Show More Authors

Semiconductor quantum dots (QDs) have attracted tremendous attentions for their unique characteristics for solid-state lighting and thin-film display applications. A simple chemical method was used to synthesis quantum dots (QDs) of zinc sulfide (ZnS) with low cost. The XRD) shows cubic phase of the prepared ZnS with an average particles size of (3-29) nm. In UV-Vis. spectra observed a large blue shift over 38 nm. The band gaps energy (Eg) was 3.8 eV and 3.37eV from the absorption and photoluminescence (PL) respectively which larger than the Eg for bulk. QDs-LED hybrid devices were fabricated using ITO/ PEDOT: PSS/ Poly-TPD/ ZnS-QDs/ with different electron transport layers and cathode of LiF/Al layers. The EL spectrum reveals a bro

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Sun Jun 08 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Secure E-Voting System Utilizing Fingerprint Authentication, AES-GCM Encryption and Hybrid Blind Watermarking
...Show More Authors

Ensuring security, integrity, and reliability of the election process consider as the main challenges in the electronic voting system. This paper describes the e-voting system by integrating the biometric authentication, advanced encryption, and watermarking techniques towards meeting such challenges. The system employs the fingerprint authentication by utilizing the Scale-Invariant Feature Transform (SIFT) for verifying the identity of the voter to ensure genuineness and non-repudiation of the service. The vote will be encrypted with the AES-GCM technique to be employed in securing the voting process, thus ensuring both data privacy and integrity. Hybrid Blind Watermarking employs the technique of Discrete Wavelet Transform (DWT) a

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Oct 01 2016
Journal Name
International Communications In Heat And Mass Transfer
Study of synthesis, stability and thermo-physical properties of graphene nanoplatelet/platinum hybrid nanofluid
...Show More Authors

In the present study a new synthesis method has been introduced for the decoration of platinum(Pt) on the functionalized graphene nanoplatelet (GNP) and also highlighted the preparation method of nanofluids. GNP–Pt uniform nanocomposite was produced from a simple chemical reaction procedure, which included acid treatment for functionalization of GNP. The surface characterization was performed by various techniques such as XRD, FESEMand TEM. The effective thermal conductivity, density, viscosity, specific heat capacity and stability of functionalized GNP–Pt water based nanofluids were investigated in different instruments. The GNP–Pt hybrid nanofluids were prepared by dispersing the nanocomposite in base fluid without adding any surfac

... Show More
Scopus (199)
Crossref (187)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Modern Applied Science
Hybrid Methodology for Image Segmentation Based on Active Contour Module and Alpha-Shape Theory
...Show More Authors

The concept of the active contour model has been extensively utilized in the segmentation and analysis of images. This technology has been effectively employed in identifying the contours in object recognition, computer graphics and vision, biomedical processing of images that is normal images or medical images such as Magnetic Resonance Images (MRI), X-rays, plus Ultrasound imaging. Three colleagues, Kass, Witkin and Terzopoulos developed this energy, lessening “Active Contour Models” (equally identified as Snake) back in 1987. Being curved in nature, snakes are characterized in an image field and are capable of being set in motion by external and internal forces within image data and the curve itself in that order. The present s

... Show More
Publication Date
Tue May 01 2018
Journal Name
2018 2nd Ieee Advanced Information Management,communicates,electronic And Automation Control Conference (imcec)
Hybrid Regressor and Approximation-Based Adaptive Control of Robotic Manipulators with Contact-Free Motion
...Show More Authors

View Publication
Scopus (19)
Crossref (12)
Scopus Crossref