Preferred Language
Articles
/
joe-355
Application of Box-Behnken Method Based ANN-GA to Prediction of wt.% of Doping Elements for Incoloy 800H Coated by Aluminizing-Chromizing
...Show More Authors

In this work , an effective procedure of Box-Behnken based-ANN (Artificial Neural Network) and GA (Genetic Algorithm) has been utilized for finding the optimum conditions of wt.% of doping elements (Ce,Y, and Ge) doped-aluminizing-chromizing of Incoloy 800H . ANN and Box-Behnken design method have been implanted for minimizing hot corrosion rate kp (10-12g2.cm-4.s-1) in Incoloy 800H at 900oC . ANN was used for estimating the predicted values of hot corrosion rate kp (10-12g2.cm-4.s-1) . The optimal wt.% of doping elements combination to obtain minimum hot corrosion rate was calculated using genetic algorithm approach . The predicted optimal values for minimizing  hot corrosion rate for  Incoloy 800H coated by (Ce-Y-Ge) doped-aluminizing-chromizing are (3wt.%Ce, 3wt.%Y, and  3wt.%Ge) ,  the hot corrosion rate kp (10-12g2.cm-4.s-1) value at these conditions was found to be 71.701 . The results have been verified by confirmation experiment , results obtained by GA method match closely with experimental values (R2=98.30) . EDS and XRD results show that the formation of protective layers Al2O3 and Cr2O3 during hot corrosion tests.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Application of Sulfur-2,4-dinitrophenylhydrazine as Modifier for Producing an Advantageous Concrete
...Show More Authors

In this investigative endeavor, a novel concrete variety incorporating sulfur-2,4-dinitrophenylhydrazine modification was developed, and its diverse attributes were explored. This innovative concrete was produced using sulfur-2,4-dinitrophenylhydrazine modification and an array of components. The newly created sulfur-2,4-dinitrophenylhydrazine modifier was synthesized. The surface texture resulting from this modifier was examined using SEM and EDS techniques. The component ratios within concrete, chemical and physical traits derived from the sulfur-2,4-dinitrophenylhydrazine modifier, chemical and corrosion resistance of concrete, concrete stability against water absorption, concrete resilience against freezing, physical and mechanical p

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (1)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Physical properties of CdS/CdTe/CIGS thin films for solar cell application
...Show More Authors

View Publication
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
Ant Colony Optimization Algorithm for Design of Distribution System with Practical Application
...Show More Authors

The Ant System Algorithm (ASA) is a member of the ant colony algorithms family in swarm intelligence methods (part of the Artificial Intelligence field), which is based on the behavior of ants seeking a path and a source of food in their colonies. The aim of This algorithm is to search for an optimal solution for Combinational Optimization Problems (COP) for which is extremely difficult to find solution using the classical methods like linear and non-linear programming methods. 

The Ant System Algorithm was used in the management of water resources field in Iraq, specifically for Haditha dam which is one of the most important dams in Iraq. The target is to find out an efficient management system for

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Comparing the Sequential Nonlinear least squared Method and Sequential robust M method to estimate the parameters of Two Dimensional sinusoidal signal model:
...Show More Authors

Estimation of the unknown parameters in 2-D sinusoidal signal model can be considered as important and difficult problem. Due to the difficulty to find estimate of all the parameters of this type of models at the same time, we propose sequential non-liner least squares method and sequential robust  M method after their development through the use of sequential  approach in the estimate suggested by Prasad et al to estimate unknown frequencies and amplitudes for the 2-D sinusoidal compounds but depending on Downhill Simplex Algorithm in solving non-linear equations for the purpose of obtaining non-linear parameters estimation which represents frequencies and then use of least squares formula to estimate

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method
...Show More Authors

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
View Publication
Crossref (3)
Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (9)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Percentage of Availability of the Elements of Citizenship Concept in the Guides for Teachers of Musical Skills in the Sultanate of Oman
...Show More Authors

Abstract

This research aims to identify the availability of the elements of the concept of citizenship, to identify the distribution ratios of the outputs of the musical skills curriculum at the levels of educational goals associated with the elements of the concept of citizenship in the guides of teachers of musical skills for grades (12-1) in the Sultanate of Oman. A content analysis card was designed to include the teacher’s guides of musical skills for grades (12-1), which included the outputs, according to the grades with the identification of the elements of citizenship (identity, belonging, rights, participation). The results of the research revealed that the percentage of inclusion of citizenship values

... Show More
View Publication Preview PDF
Publication Date
Mon May 29 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
APPLICATION OF TQM REQUIREMENTS AND THEIR RELATIONSHIP TO ORGANIZATIONAL PERFORMANCE FROM THE POINT OF VIEW OF THE INTERNAL CUSTOMER/ COMPARATIVE STUDY.: APPLICATION OF TQM REQUIREMENTS AND THEIR RELATIONSHIP TO ORGANIZATIONAL PERFORMANCE FROM THE POINT OF VIEW OF THE INTERNAL CUSTOMER/ COMPARATIVE STUDY.
...Show More Authors

This study aims to Statement of the relationship between Total Quality Management philosophy and Organizational performance from the point of view of the internal customer. A comparison has been made between two companies, one of which applies the requirements of TQM well and the other does not apply these requirements as the (General Company for Electrical Industries/ Diyala) and (General Company for Electrical Industries/ Baghdad) to conduct the search, During the questionnaire prepared for this purpose and distributed to a sample of 30 employees in the General Company for Electric Industries/ Diyala and (20) employees of the General Company for Electrical Industries/ Baghdad. Their answers were analyzed using a simple correlation coef

... Show More
View Publication Preview PDF