Preferred Language
Articles
/
ijcpe-352
Vapor-Liquid-Liquid Equilibrium (VLLE) Data for the Systems Ethyl acetate + Water, Toluene + Water and Toluene + Ethyl acetate + Water at 101.3 kPa. Using Modified Equilibrium Still
...Show More Authors

Isobaric Vapor-Liquid-Liquid equilibrium data for the binary systems ethyl acetate + water, toluene + water and the ternary system toluene + ethyl acetate + water were determined by a modified equilibrium still, the still consisted of a boiling and a condensation sections supplied with mixers that helped to correct the composition of the recycled condensed liquid and the boiling temperature readings in the condensation and boiling sections respectively. The VLLE data where predicted and correlated using the Peng-Robinson Equation of State in the vapor phase and one of the activity coefficient models Wilson, NRTL, UNIQUAC and the UNIFAC in the liquid phase and also were correlated using the Peng-Robinson Equation of State in both the vapor and liquid phases.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 11 2025
Journal Name
Iraqi Statisticians Journal
Estimating General Linear Regression Model of Big Data by Using Multiple Test Technique
...Show More Authors

View Publication
Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More
Publication Date
Mon May 15 2017
Journal Name
Journal Of Theoretical And Applied Information Technology
Anomaly detection in text data that represented as a graph using dbscan algorithm
...Show More Authors

Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the

... Show More
Preview PDF
Scopus (4)
Scopus
Publication Date
Tue Mar 27 2018
Journal Name
Mustansiria Dental Journal
The Effect of Modified Carisolv Gel on Surface Roughness of two Different Types of Ceramic Materials Using Light Polarizing Microscope
...Show More Authors

This in vitro study evaluated the influence of chemomechanical caries removal solution on the surface topography of metal-ceramic feldspar porcelain (MAJOR ceramic) and All-ceramic feldspar porcelain (Vita Alpha) using light polarizing microscope. Forty specimens of MAJOR ceramic and forty specimens of Vita Alpha ceramic of (12mm diameter & 3mm height) were prepared .All specimens were polished with silicon polishing burs, cleaned, autoglazed and stored in 37°C before exposure to Carisolv. Thirty specimens of each material randomly exposed to Carisolv gel for 5, 10 and 20 minutes respectively, other ten specimens were not, to act as control group. All specimens were subjected to surface roughness test by profilometer and evalua

... Show More
View Publication
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Technology Reports Of Kansai University
Modified Robust AES Architecture
...Show More Authors

Data security is a fundamental parameter on communication system development. The capability of protecting and securing the information is a great essence for the growth of the data security and electronic commerce. The cryptography has a significant influence upon information security systems against the variety of the attacks, in which higher complexity in secret keys results in the increase of security and the cryptography algorithms’ complexity. The sufficient and newer cryptographic methods’ versions may helpful in the reduction of the security attacks. The main aim of this research is satisfying the purpose of the information security through the addition of a new security level to the Advanced Encryption Standard (AES) algorithm

... Show More
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
SYNTHESIS OF THE NEW NAPROXEN SELECTIVE ELECTRODE BASED ON IMPRINTED POLYMER USING DIFFERENT MONOMERS AND ITS DETERMINATION AT PHARMACEUTICAL PREPARATION: SYNTHESIS OF THE NEW NAPROXEN SELECTIVE ELECTRODE BASED ON IMPRINTED POLYMER USING DIFFERENT MONOMERS AND ITS DETERMINATION AT PHARMACEUTICAL PREPARATION
...Show More Authors

ABSTRACT

Naproxen(NPX) imprinted liquid electrodes of polymers are built using polymerization precipitation. The molecularly imprinted (MIP) and non imprinted (NIP) polymers were synthesized using NPX as a template. In the polymerization precipitation involved, styrene(STY) was used as monomer, N,N-methylenediacrylamide (N,N-MDAM) as a cross-linker and benzoyl peroxide (BPO) as an initiator. The molecularly imprinted membranes and the non-imprinted membranes were prepared using acetophenone(AOPH) and di octylphathalate(DOP)as plasticizers in PVC matrix. The slopes and detection limits of the liquid electrodes ranged from)-18.1,-17.72 (mV/decade and )4.0 x 10-

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Modeling and Simulation for Performance Evaluation of Optical Quantum Channels in Quantum key Distribution Systems
...Show More Authors

In this research work, a simulator with time-domain visualizers and configurable parameters using a continuous time simulation approach with Matlab R2019a is presented for modeling and investigating the performance of optical fiber and free-space quantum channels as a part of a generic quantum key distribution system simulator. The modeled optical fiber quantum channel is characterized with a maximum allowable distance of 150 km with 0.2 dB/km at =1550nm. While, at =900nm and =830nm the attenuation values are 2 dB/km and 3 dB/km respectively. The modeled free space quantum channel is characterized at 0.1 dB/km at =860 nm with maximum allowable distance of 150 km also. The simulator was investigated in terms of the execution of the BB84 p

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (5)
Scopus Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Iraqi Journal Of Physics
Coupled channels calculations of fusion reactions for 46Ti+64Ni, 40Ca+194Pt and 40Ar+148Sm systems
...Show More Authors

In this work, the fusion cross section ,  fusion barrier distribution  and the probability of fusion  have been investigated by coupled channel method  for the systems 46Ti+64Ni, 40Ca+194Pt and 40Ar+148Sm with semi-classical and quantum mechanical approach using SCF and CCFULL Fortran codes respectively. The results for these calculations are compared with available experimental data. The results show that the quantum calculations agree better with experimental data, especially bellow the Coulomb barrier, for the studied systems while above this barrier, the two codes reproduce the data.

View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Dec 23 2020
Journal Name
Iraqi Journal For Electrical And Electronic Engineering
Heuristic and Meta-Heuristic Optimization Models for Task Scheduling in Cloud-Fog Systems: A Review
...Show More Authors

Nowadays, cloud computing has attracted the attention of large companies due to its high potential, flexibility, and profitability in providing multi-sources of hardware and software to serve the connected users. Given the scale of modern data centers and the dynamic nature of their resource provisioning, we need effective scheduling techniques to manage these resources while satisfying both the cloud providers and cloud users goals. Task scheduling in cloud computing is considered as NP-hard problem which cannot be easily solved by classical optimization methods. Thus, both heuristic and meta-heuristic techniques have been utilized to provide optimal or near-optimal solutions within an acceptable time frame for such problems. In th

... Show More
View Publication
Crossref (11)
Crossref