Preferred Language
Articles
/
zBYHC4cBVTCNdQwCujJr
Construction of a General-Purpose Infrastructure for Rfid – Based Applications
...Show More Authors

View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Ieee Access
A Magnetic Field Concentration Method for Magnetic Flux Leakage Detection of Rail-Top Surface Cracks
...Show More Authors

View Publication
Scopus (11)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Solar Energy
A new approach for employing multiple PCMs in the passive thermal management of photovoltaic modules
...Show More Authors

View Publication
Scopus (120)
Crossref (116)
Scopus Clarivate Crossref
Publication Date
Tue Nov 09 2021
Journal Name
Abu Dhabi International Petroleum Exhibition & Conference
Numerical Simulation of Gas Lift Optimization Using Artificial Intelligence for a Middle Eastern Oil Field
...Show More Authors
Abstract<p>Artificial lift techniques are a highly effective solution to aid the deterioration of the production especially for mature oil fields, gas lift is one of the oldest and most applied artificial lift methods especially for large oil fields, the gas that is required for injection is quite scarce and expensive resource, optimally allocating the injection rate in each well is a high importance task and not easily applicable. Conventional methods faced some major problems in solving this problem in a network with large number of wells, multi-constrains, multi-objectives, and limited amount of gas. This paper focuses on utilizing the Genetic Algorithm (GA) as a gas lift optimization algorit</p> ... Show More
View Publication
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Acta Pharmaceutica Sinica B
Discovery of a potent and dual-selective bisubstrate inhibitor for protein arginine methyltransferase 4/5
...Show More Authors

View Publication
Scopus (24)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
Ieee Internet Of Things Journal
A New Task Allocation Protocol for Extending Stability and Operational Periods in Internet of Things
...Show More Authors

Scopus (20)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Sun Oct 02 2011
Journal Name
Journal Of Educational And Psychological Researches
The Effect of a consulting program for decreasing withdrawal behavior of the children with autism of kindergarten
...Show More Authors

       unacceptable social behaviors, particularly withdrawal behavior that appears in children with autism represent a major problem hindering the process of communication with those around them and therefore the process of mergence  with them be difficult.

     The withdrawal causes a real affect deficit for children with autism limits the possibility of development of their intellectual and mental growth due to their solitude and the weakness of their focus in the acquisition of pedagogical skills and lack the necessary social skills to maintain the relations of friendship and enjoyment of them.

      withdrawal children fail to participate

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More
Publication Date
Fri Jan 10 2025
Journal Name
International Journal Of Scientific Research In Science, Engineering And Technology
Image Cryptography Based on Chebyshev Polynomials and Transposition- Substitution Transformations
...Show More Authors

The confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing  complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut

... Show More
View Publication
Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Online Sumarians Cuneiform Detection Based on Symbol Structural Vector Algorithm
...Show More Authors

The cuneiform images need many processes in order to know their contents
and by using image enhancement to clarify the objects (symbols) founded in the
image. The Vector used for classifying the symbol called symbol structural vector
(SSV) it which is build from the information wedges in the symbol.
The experimental tests show insome numbersand various relevancy including
various drawings in online method. The results are high accuracy in this research,
and methods and algorithms programmed using a visual basic 6.0. In this research
more than one method was applied to extract information from the digital images
of cuneiform tablets, in order to identify most of signs of Sumerian cuneiform.

View Publication Preview PDF
Publication Date
Sun Sep 03 2023
Journal Name
Iraqi Journal Of Computers, Communications, Control & Systems Engineering (ijccce)
Efficient Iris Image Recognition System Based on Machine Learning Approach
...Show More Authors

HM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023

View Publication