Preferred Language
Articles
/
bRdUTo8BVTCNdQwCT2o9
A Novel Design for Gas Sensor of Zinc Oxide Nanostructure Prepared by Hydrothermal Annealing Technique
...Show More Authors

Scopus
Publication Date
Mon Dec 01 2025
Journal Name
International Communications In Heat And Mass Transfer
Design optimization and performance analysis of a PCM-to-air heat exchanger with optimized fin configuration for building heating applications
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Business, Communication & Technology
Exploring the Adoption of Big Data Analytics in the Oil and Gas Industry: A Case Study
...Show More Authors

The oil and gas industry relies heavily on IT innovations to manage business processes, but the exponential generation of data has led to concerns about processing big data, generating valuable insights, and making timely decisions. Many companies have adopted Big Data Analytics (BDA) solutions to address these challenges. However, determining the adoption of BDA solutions requires a thorough understanding of the contextual factors influencing these decisions. This research explores these factors using a new Technology-Organisation-Environment (TOE) framework, presenting technological, organisational, and environmental factors. The study used a Delphi research method and seven heterogeneous panelists from an Oman oil and gas company

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue Mar 01 2016
Journal Name
Al-academy
Harmonization formative in the design of interior spaces Hall of discussions in the design department (a model): بدريا محمد حسن فرج
...Show More Authors

Can not reach a comprehensive concept for interior design through the use of Harmonization term according transformations experienced by the terms of the variables associated with the backlog of cultures that characterize concepts according to the nature of the users of the spaces in the design output, which necessitates the meaning of the combination of knowledge, art, science, such as the type of perceptions design the Harmonization cognitive science with art to create products of the use of design configurations that help the designer to put such a product within the reality and like the fact that reliable, as well as the rational knowledge tend somehow to the objective specifically in facilitating the substance subject to perceptible

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
Design and Implementation of a Multiplier free FPGA based OFDM Transmitter
...Show More Authors

Orthogonal Frequency Division Multiplexing (OFDM) is an efficient multi-carrier technique.The core operation in the OFDM systems is the FFT/IFFT unit that requires a large amount of hardware resources and processing delay. The developments in implementation techniques likes Field Programmable Gate Array (FPGA) technologies have made OFDM a feasible option. The goal of this paper is to design and implement an OFDM transmitter based on Altera FPGA using Quartus software. The proposed transmitter is carried out to simplify the Fourier transform calculation by using decoder instead of multipliers. After programming ALTERA DE2 FPGA kit with implemented project, several practical tests have been done starting from monitoring all the results of

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Journal Of Safety Research
Analysis of prevention through design studies in construction: A subject review
...Show More Authors

View Publication
Scopus (21)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Journal Of Industrial And Engineering Chemistry
Petroleum refinery wastewater treatment using a novel combined electro-Fenton and photocatalytic process
...Show More Authors

View Publication
Scopus (31)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sun Mar 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Structure Rheology of Polyethylene Oxide Solution
...Show More Authors

Intrinsic viscosities have been studied for polyethylene oxide in water which has wide industrial applications. The polyethylene oxide samples had two different structures, the first one was linear and covers a wide range of molecular weight of 1, 3, 10, 20, 35, 99, 370, 1100, 4600, and 8000 kg/mol and the second one was branched and had molecular weights of 0.55 and 40 kg/mol.
Intrinsic viscosities and Huggins constants have been determined for all types and molecular weights mentioned above at 25ºC using a capillary viscometer. The values of Mark-Houwink parameters (K and a) were equal to 0.0068 ml/g and 0.67 respectively, and have not been published for this range of molecular weight in as yet.

View Publication Preview PDF
Publication Date
Sun Jan 10 2016
Journal Name
British Journal Of Applied Science & Technology
Robust Watermarking for Video Using Modulation Technique on RGB Domain
...Show More Authors

In this paper, a robust invisible watermarking system for digital video encoded by MPEG-4 is presented. The proposed scheme provides watermark hidden by embedding a secret message (watermark) in the sprite area allocated in reference frame (I-frame). The proposed system consists of two main units: (i) Embedding unit and (ii) Extraction unit. In the embedding unit, the system allocates the sprite blocks using motion compensation information. The allocated sprite area in each I–frame is used as hosting area for embedding watermark data. In the extraction unit, the system extracts the watermark data in order to check authentication and ownership of the video. The watermark data embedding method is Blocks average modulation applied on RGB dom

... Show More
View Publication Preview PDF
Crossref