Preferred Language
Articles
/
qBf2Q44BVTCNdQwCtz9G
Performance enhancement of high degree Charlier polynomials using multithreaded algorithm
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Microporous And Mesoporous Materials
Using the ash of common water reeds as a silica source for producing high purity ZSM-5 zeolite microspheres
...Show More Authors

View Publication
Scopus (33)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Inorganic Chemistry Communications
Sustainable adsorptive removal of high concentration organic contaminants from water using biodegradable Gum-Acacia integrated magnetite nanoparticles hydrogel adsorbent
...Show More Authors

Release of industrial effluents comprising dyes in water bodies is one of the foremost causes of water pollution. Therefore, the proper and proficient treatment of these dyes contaminated left-over material before their release is crucial. Herein, an eco-friendly biological macromolecule Gum-Acacia (GA) integrated Fe3O4 nanoparticles composite hydrogel was manufactured via co-precipitation technique for effective adsorption of Congo red (CR) dye existing in water bodies. The as-prepared magnetic GA/Fe3O4 composite hydrogel was characterized by FTIR, XRD, EDX, VSM, SEM, and BET techniques. These studies discovered the fruitful fabrication of biodegradable magnetic GA/Fe3O4 composite hydrogel possessing porous structure with large surface are

... Show More
View Publication
Scopus (21)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2015
Journal Name
Computer Systems Science & Engineering
Parameters' fine tuning of differential evolution algorithm
...Show More Authors

Most heuristic search method's performances are dependent on parameter choices. These parameter settings govern how new candidate solutions are generated and then applied by the algorithm. They essentially play a key role in determining the quality of the solution obtained and the efficiency of the search. Their fine-tuning techniques are still an on-going research area. Differential Evolution (DE) algorithm is a very powerful optimization method and has become popular in many fields. Based on the prolonged research work on DE, it is now arguably one of the most outstanding stochastic optimization algorithms for real-parameter optimization. One reason for its popularity is its widely appreciated property of having only a small number of par

... Show More
Scopus (7)
Scopus
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
IMPROVED STRUCTURE OF DATA ENCRYPTION STANDARD ALGORITHM
...Show More Authors

The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene

... Show More
Publication Date
Sun Jun 01 2025
Journal Name
Journal Of Physics: Conference Series
Determination of Radioactivity Levels in Some Rice Samples available in the Iraqi Markets Using the system of High-purity Germanium
...Show More Authors
Abstract<p>This study aimed to determine the radioactivity and radiation hazard indicators of rice samples potentially for human consumption. Gamma spectroscopy was used to calculate the specific activity of natural and artificial radionuclides (<sup>238</sup>U, <sup>232</sup>Th, <sup>40</sup>K, and <sup>137</sup>Cs) in local and imported rice samples collected from local markets in Baghdad Governorate, Iraq, in addition to various radiological hazard indices. The radionuclide concentrations in the samples varied from 2.123 ± 1.457 Bq/kg to 13.032 ± 3.610 Bq/kg for <sup>238</sup>U, 2.906 ± 1.705 Bq/kg to 17.290 ± 4.158 Bq/kg for <sup>232</sup></p> ... Show More
View Publication
Scopus Crossref
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Engineering
Modeling and Simulation of Solar Module performance using Five Parameters Model by using Matlab in Baghdad City
...Show More Authors

This work presents the modeling of the electrical response of monocrystalline photovoltaic module by using five parameters model based on manufacture data-sheet of a solar module that measured in stander test conditions (STC) at radiation 1000W/m² and cell temperature 25 . The model takes into account the series and parallel (shunt) resistance of the module. This paper considers the details of Matlab modeling of the solar module by a developed Simulink model using the basic equations, the first approach was to estimate the parameters: photocurrent Iph, saturation current Is, shunt resistance Rsh, series resistance Rs, ideality factor A at stander test condition (STC) by an ite

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Jul 17 2022
Journal Name
Al–bahith Al–a'alami
Employing; Health Awareness, Health Awareness Announcements: (A research takenfrom a master’s degree thesis)
...Show More Authors

The goal of health awareness is to familiarize people with health information and facts, and make them realize their sense of responsibility towards their health and the health of others.   And translate that goal in practice through applying healthy and sound behaviors spontaneously. This, the goal, is pursued by health awareness announcements through employing announcement persuasion of health as one of the methods of influencing the masses to adopt ideas, behaviors, and adherence to health advice and guidelines; The study aims to analyze the content of the Ministry of Health and Environment announcements regarding health awareness and to reveal the most employable persuasions in health awareness announcements

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
A Study on Co – odd (even) Sum Degree Edge Domination Number in Graphs
...Show More Authors

 An edge dominating set    of a graph  is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number  is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G.  The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sat Jun 01 2013
Journal Name
Engineering And Technology Journal
Performance Improvement of Multi-UserMC-CDMA system Using Discrete Hartly Transform Mapper
...Show More Authors

Future wireless communication systems must be able to accommodate a large number of users and simultaneously to provide the high data rates at the required quality of service. In this paper a method is proposed to perform the N-Discrete Hartley Transform (N-DHT) mapper, which are equivalent to 4-Quadrature Amplitude Modulation (QAM), 16-QAM, 64-QAM, 256-QAM, … etc. in spectral efficiency. The N-DHT mapper is chosen in the Multi Carrier Code Division Multiple Access (MC-CDMA) structure to serve as a data mapper instead of the conventional data mapping techniques like QPSK and QAM schemes. The proposed system is simulated using MATLAB and compared with conventional MC-CDMA for Additive White Gaussian Noise, flat, and multi-path selective fa

... Show More
View Publication Preview PDF
Crossref