Preferred Language
Articles
/
dRbwm4cBVTCNdQwCkFht
A Genetic Algorithm Based Approach For Generating Unit Maintenance Scheduling
...Show More Authors

Publication Date
Wed Jan 01 2025
Journal Name
Lecture Notes In Networks And Systems
Symlet Analysis for ECG-Based Diagnosis of Heart Dysfunction
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sat Aug 01 2015
Journal Name
International Journal Of Advanced Research In Computer Science And Software Engineering
Partial Encryption for Colored Images Based on Face Detection
...Show More Authors

Publication Date
Tue Jan 08 2019
Journal Name
Iraqi Journal Of Physics
Polymer electrolytes based PAN for dye-sensitized solar cells
...Show More Authors

Solar cells has been assembly with electrolytes including I−/I−3 redox duality employ polyacrylonitrile (PAN), ethylene carbonate (EC), propylene carbonate (PC), with double iodide salts of tetrabutylammonium iodide (TBAI) and Lithium iodide (LiI) and iodine (I2) were thoughtful for enhancing the efficiency of the solar cells. The rendering of the solar cells has been examining by alteration the weight ratio of the salts in the electrolyte. The solar cell with electrolyte comprises (60% wt. TBAI/40% wt. LiI (+I2)) display elevated efficiency of 5.189% under 1000 W/m2 light intensity. While the solar cell with electrolyte comprises (60% wt. LiI/40% wt. TBAI (+I2)) display a lower efficiency of 3.189%. The conductivity raises with the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Materials Research Express
SiC composite based selective electromagnetic propagation for GHz application
...Show More Authors

View Publication
Scopus (6)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Compression-based Data Reduction Technique for IoT Sensor Networks
...Show More Authors

Energy savings are very common in IoT sensor networks because IoT sensor nodes operate with their own limited battery. The data transmission in the IoT sensor nodes is very costly and consume much of the energy while the energy usage for data processing is considerably lower. There are several energy-saving strategies and principles, mainly dedicated to reducing the transmission of data. Therefore, with minimizing data transfers in IoT sensor networks, can conserve a considerable amount of energy. In this research, a Compression-Based Data Reduction (CBDR) technique was suggested which works in the level of IoT sensor nodes. The CBDR includes two stages of compression, a lossy SAX Quantization stage which reduces the dynamic range of the

... Show More
View Publication Preview PDF
Scopus (41)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Sat Mar 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Deep-Learning-Based Mobile Application for Detecting COVID-19
...Show More Authors

Patients infected with the COVID-19 virus develop severe pneumonia, which typically results in death. Radiological data show that the disease involves interstitial lung involvement, lung opacities, bilateral ground-glass opacities, and patchy opacities. This study aimed to improve COVID-19 diagnosis via radiological chest X-ray (CXR) image analysis, making a substantial contribution to the development of a mobile application that efficiently identifies COVID-19, saving medical professionals time and resources. It also allows for timely preventative interventions by using more than 18000 CXR lung images and the MobileNetV2 convolutional neural network (CNN) architecture. The MobileNetV2 deep-learning model performances were evaluated

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Cybersecurity And Information Management
Machine Learning-based Information Security Model for Botnet Detection
...Show More Authors

Botnet detection develops a challenging problem in numerous fields such as order, cybersecurity, law, finance, healthcare, and so on. The botnet signifies the group of co-operated Internet connected devices controlled by cyber criminals for starting co-ordinated attacks and applying various malicious events. While the botnet is seamlessly dynamic with developing counter-measures projected by both network and host-based detection techniques, the convention techniques are failed to attain sufficient safety to botnet threats. Thus, machine learning approaches are established for detecting and classifying botnets for cybersecurity. This article presents a novel dragonfly algorithm with multi-class support vector machines enabled botnet

... Show More
View Publication
Scopus (12)
Crossref (7)
Scopus Crossref
Publication Date
Tue Sep 28 2021
Journal Name
Journal Of The College Of Education For Women
The Role of Binary Settings in John Updike’s Short Stories: A Structuralist Approach: مؤيد انوية ججو الجماني
...Show More Authors

John Updike’s use of setting in his fiction has elicited different and even conflicting reactions from critics, varying from symbolic interpretations of setting to a sense of confusion at his use of time and place in his stories.  The present study is an attempt at examining John Updike’s treatment of binary settings in Pigeon Feathers and Other Stories (1962) to reveal theme, characters’ motives and conflicts.  Analyzing Updike’s stories from a structuralist’s perspective reveals his employment of two different places and times in the individual stories as a means of reflecting the psychological state of the characters, as in “The Persistence of Desire”, or expressing conflicting views on social and political is

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2024
Journal Name
Journal Of Radiation Research And Applied Sciences
Bioaccumulation and translocation of radionuclides heavy metals in Cynodon dactylon: A phytoremediation approach in Al-Dora refinery
...Show More Authors

View Publication
Crossref (2)
Clarivate Crossref
Publication Date
Mon Jun 23 2025
Journal Name
Islamic Communication Journal
Negotiating the meaning of female genital mutilation and cutting: A symbolic interactionist approach among religious university students
...Show More Authors

The meanings attributed to Female Genital Mutilation/Cutting (FGM/C) are shaped through complex negotiations within religious and socio-cultural frameworks, including those observed in Indonesia. Using a combined qualitative and quantitative (mixed methods)-ethnographic and survey approach, data from 109 students of religious tertiary institutions in East Kalimantan on their perspectives on FGM/C practices can be more comprehensively explored. The results of the study, which were analysed using the three principles of symbolic interactionism, showed that 72.5 per cent of religious college student families still practice FGM/C and 53.2 per cent stated that FGM/C practices are beneficial for women.  However, they are also willing, if

... Show More
View Publication
Crossref