Preferred Language
Articles
/
tYY31YYBIXToZYALBLVz
Developing a Predictive Model and Multi-Objective Optimization of a Photovoltaic/Thermal System Based on Energy and Exergy Analysis Using Response Surface Methodology
...Show More Authors

Crossref
View Publication
Publication Date
Sat Sep 01 2012
Journal Name
Journal Of Economics And Administrative Sciences
New Approach for Solving Multi – Objective Problems
...Show More Authors

  There are many researches deals with constructing an efficient solutions for real problem having Multi - objective confronted with each others. In this paper we construct a decision for Multi – objectives based on building a mathematical model formulating a unique objective function by combining the confronted objectives functions. Also we are presented some theories concerning this problem. Areal application problem has been presented to show the efficiency of the performance of our model and the method. Finally we obtained some results by randomly generating some problems.

View Publication Preview PDF
Crossref
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
2018 Third Scientific Conference Of Electrical Engineering (scee)
An Intelligent Cognitive System Design for Mobile Robot based on Optimization Algorithm
...Show More Authors

View Publication
Scopus (7)
Scopus Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Wed Aug 17 2022
Journal Name
Sustainability
Experimental Evaluation of the Thermoelectrical Performance of Photovoltaic-Thermal Systems with a Water-Cooled Heat Sink
...Show More Authors

A design for a photovoltaic-thermal (PVT) assembly with a water-cooled heat sink was planned, constructed, and experimentally evaluated in the climatic conditions of the southern region of Iraq during the summertime. The water-cooled heat sink was applied to thermally manage the PV cells, in order to boost the electrical output of the PVT system. A set of temperature sensors was installed to monitor the water intake, exit, and cell temperatures. The climatic parameters including the wind velocity, atmospheric pressure, and solar irradiation were also monitored on a daily basis. The effects of solar irradiation on the average PV temperature, electrical power, and overall electrical-thermal efficiency were investigated. The findings i

... Show More
View Publication
Scopus (31)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Ecological Engineering
Ability of Response Surface Methodology to Optimize Photocatalytic Degradation of Amoxicillin from Aqueous Solutions Using Immobilized TiO<sub>2</sub>/Sand
...Show More Authors

View Publication
Scopus (12)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Energy Storage
Multiple-segment metal foam application in the shell-and-tube PCM thermal energy storage system
...Show More Authors

View Publication
Scopus (166)
Crossref (139)
Scopus Clarivate Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Energy Storage
Effects of non-uniform fin arrangement and size on the thermal response of a vertical latent heat triple-tube heat exchanger
...Show More Authors

View Publication
Scopus (58)
Crossref (47)
Scopus Clarivate Crossref