Preferred Language
Articles
/
ijcpe-694
A Simple Method for Studying Crushability and Grindability of Rocks and Minerals
...Show More Authors

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (10)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 06 2015
Journal Name
Baghdad Science Journal
A New Three Step Iterative Method without Second Derivative for Solving Nonlinear Equations
...Show More Authors

In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.

View Publication Preview PDF
Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A New Feature-Based Method for Similarity Measurement under the Linux Operating System
...Show More Authors

This paper presents a new algorithm in an important research field which is the semantic word similarity estimation. A new feature-based algorithm is proposed for measuring the word semantic similarity for the Arabic language. It is a highly systematic language where its words exhibit elegant and rigorous logic. The score of sematic similarity between two Arabic words is calculated as a function of their common and total taxonomical features. An Arabic knowledge source is employed for extracting the taxonomical features as a set of all concepts that subsumed the concepts containing the compared words. The previously developed Arabic word benchmark datasets are used for optimizing and evaluating the proposed algorithm. In this paper,

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Baghdad Science Journal
Studying the Magnetohydrodynamics for Williamson Fluid with Varying Temperature and Concentration in an Inclined Channel with Variable Viscosity
...Show More Authors

        In this paper, the Magnetohydrodynamic (MHD) for Williamson fluid with varying temperature and concentration in an inclined channel with variable viscosity has been examined. The perturbation technique in terms of the Weissenberg number  to obtain explicit forms for the velocity field has been used. All the solutions of physical parameters of the Darcy parameter , Reynolds number , Peclet number  and Magnetic parameter  are discussed under the different values as shown in plots.

View Publication Preview PDF
Scopus (6)
Scopus Clarivate Crossref
Publication Date
Wed Nov 04 2020
Journal Name
Systematic Reviews In Pharmacy
Removal of Brilliant Dyes from its Aqueous Solution by Adsorption on Siliceous Rocks
...Show More Authors

In this study involves removing of Brilliant Dyes, were which (Brilliant Green {BG} and Brilliant Cresyl Blue {BCB}) by using Iraqi Siliceous Rocks Powder (SRP). Adsorption isotherms were studied and the factors which prefer it, like temperature and salt effect, Adsorption isotherms of dyes, Brilliant Cresyl Blue {BCB} was found to be comparable to Langmuir equation according to Giles classification, isotherms dye Brilliant Green {BG} was found to be comparable to Freundlich equation more than dye Brilliant Blue {BCB} according to Giles classification. The adsorption process on this surface (SRP) studied at different temperatures, the results showed that the adsorption of dyes (BCB, BG) on the surface increased with increased temperature (E

... Show More
Preview PDF
Publication Date
Tue Nov 07 2017
Journal Name
Spe Symposium: Production Enhancement And Cost Optimisation
Wettability Alteration of Carbonate Rocks via Nanoparticle-Anionic Surfactant Flooding at Reservoirs Conditions
...Show More Authors

Nanofluids, liquid suspensions of nanoparticles (NPs) dispersed in deionized (DI) water, brine, or surfactant micelles, have become a promising solution for many industrial applications including enhanced oil recovery (EOR) and carbon geostorage. At ambient conditions, nanoparticles can effectively alter the wettability of the strongly oil-wet rocks to water-wet. However, the reservoir conditions present the greatest challenge for the success of this application at the field scale. In this work, the performance of anionic surfactant-silica nanoparticle formulation on wettability alteration of oil-wet carbonate surface at reservoir conditions was investigated. A high-pressure temperature vessel was used to apply nano-modification of oil-wet

... Show More
Scopus (46)
Crossref (20)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Journal Of Advanced Pharmacy Education And Research
Ultra HPLC method development and validation for the determination of meclizine in pharmaceutical formulation
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
Studying the Behavior of Asphalt Stabilized Gepseous Soil for Earth Embankment Model
...Show More Authors

The study presents the test results of stabilizing gypseous soil embankment obtained from
Al- Faluja university Campus at Al-Ramady province. The laboratory investigation was divided
into three phases, The physical and chemical properties, the optimum liquid asphalt (emulsion)
requirements (which are manufactured in Iraq) were determined by using one dimensional
unconfined compression strength test.in the first phase , The optimum fluid content was 11%
(6% of emulsion with 5% water content).. At phase two, the effect of Aeration technique was
investigated using both direct shear and permeability test. At phase three for the case of static
load , the pure soil embankment model under dry test condition was investigated

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref