Preferred Language
Articles
/
z2F0TZkBdMdGkNqjeSU3
Estimating General Linear Regression Model of Big Data by Using Multiple Test Technique
...Show More Authors

Crossref
View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Journal Of Physics: Conference Series
Green synthesis of gold NPs by using dragon fruit: Toxicity and wound healing
...Show More Authors
Abstract<p>In this work, the study of <italic>Hylocereus undatus</italic> properties was done by studying quantitative phytochemical compounds and seeking for total phenolic compounds, synthesis of gold nanoparticles was created via reduction of aqueous gold ions with the aqueous fruit extract of The <italic>Hylocereus undatus</italic> (dragon). The synthesized AuNPs were asserted by using (Uv-Vis) spectrophotometer; Fourier transforms infrared (FI-IR) spectroscopy, Atomic force microscope (AFM), Scanning Electron Microscopy (SEM) Zitasizer. The absorbance for SPR is noticed in 546 nm by using Uv-Visible spectroscopy The SEM and AFM analysis evidenced the particle size betwee</p> ... Show More
View Publication
Scopus (31)
Crossref (23)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Iop Conference Series: Materials Science And Engineering
Improvement of the Gypseous soil properties by using Copolymer and Styrene-butadiene rubber
...Show More Authors
Abstract<p>Gypseous soils are spread in several regions in the world including Iraq, where it covers more than 28.6% [1] of the surface region of the country. This soil, with high gypsum content causes different problems in construction and strategic projects. As a result of water flow through the soil mass, permeability and chemical arrangement of these soils vary over time due to the solubility and leaching of gypsum. In this study the soil of 36% gypsum content, is taken from one location about 100 km (62 mi) southwest of Baghdad, where the sample is taken from depth (0.5 - 1) m below the natural ground surface and mixed with (3%, 6%, 9%) of Copolymer and Styrene-butadiene Rubber to improve t</p> ... Show More
Scopus (11)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Jul 05 2018
Journal Name
Eurasip Journal On Wireless Communications And Networking
Positioning and guiding educational robots by using fingerprints of WiFi and RFID array
...Show More Authors

View Publication
Scopus (7)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Journal Of Engineering
Decolorizing of Malachite Green Dye by Adsorption Using Corn Leaves as Adsorbent Material
...Show More Authors

This paper presents the ability to use cheap adsorbent (corn leaf) for the removal of Malachite Green (MG) dye from its aqueous solution. A batch mode was used to study several factors, dye concentration (50-150) ppm, adsorbent dosage (0.5-2.5) g/L, contact time (1-4) day, pH (2-10), and temperature (30-60)   The results indicated that the removal efficiency increases with the increase of adsorbent dosage and contact time, while inversely proportional to the increase in pH and temperature. An SEM device characterized the adsorbent corn leaves. The adsorption's resulting data were in agreement with Freundlich isotherm according to the regression analysis, and the kinetics data followed pseudo-first-order kinetic with a correlation

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sat Jun 06 2020
Journal Name
Egyptian Journal Of Chemistry
Treatment of petroleum refinery wastewater by electro-Fenton process using porous graphite electrodes
...Show More Authors

View Publication
Scopus (29)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Oct 09 2023
Journal Name
2023 Ieee 34th International Symposium On Software Reliability Engineering Workshops (issrew)
Semantics-Based, Automated Preparation of Exploratory Data Analysis for Complex Systems
...Show More Authors

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2025
Journal Name
Al-khwarizmi Engineering Journal
Recent Tools of Software-Defined Networking Traffic Generation and Data Collection
...Show More Authors

أثبتت الشبكات المحددة بالبرمجيات (SDN) تفوقها في معالجة مشاكل الشبكة العادية مثل قابلية التوسع وخفة الحركة والأمن. تأتي هذه الميزة من SDN بسبب فصل مستوى التحكم عن مستوى البيانات. على الرغم من وجود العديد من الأوراق والدراسات التي تركز على إدارة SDN، والرصد، والتحكم، وتحسين QoS، إلا أن القليل منها يركز على تقديم ما يستخدمونه لتوليد حركة المرور وقياس أداء الشبكة. كما أن المؤلفات تفتقر إلى مقارنات بين الأدوات والأ

... Show More
View Publication
Crossref
Publication Date
Sat Aug 01 2015
Journal Name
2015 Ieee Conference On Computational Intelligence In Bioinformatics And Computational Biology (cibcb)
Granular computing approach for the design of medical data classification systems
...Show More Authors

View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
IMPLEMENTATION OF THE SKIP LIST DATA STRUCTURE WITH IT'S UPDATE OPERATIONS
...Show More Authors

A skip list data structure is really just a simulation of a binary search tree. Skip lists algorithm are simpler, faster and use less space. this data structure conceptually uses parallel sorted linked lists. Searching in a skip list is more difficult than searching in a regular sorted linked list. Because a skip list is a two dimensional data structure, it is implemented using a two dimensional network of nodes with four pointers. the implementation of the search, insert and delete operation taking a time of upto . The skip list could be modified to implement the order statistic operations of RANKand SEARCH BY RANK while maintaining the same expected time. Keywords:skip list , parallel linked list , randomized algorithm , rank.

View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF