Preferred Language
Articles
/
JhbgQIcBVTCNdQwCKT6P
Evolutionary Feature Optimization for Plant Leaf Disease Detection by Deep Neural Networks
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Oct 17 2011
Journal Name
Journal Of Engineering
MODIFIED TRAINING METHOD FOR FEEDFORWARD NEURAL NETWORKS AND ITS APPLICATION in 4-LINK SCARA ROBOT IDENTIFICATION
...Show More Authors

In this research the results of applying Artificial Neural Networks with modified activation function to perform the online and offline identification of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot will be described. The proposed model of identification strategy consists of a feed-forward neural network with a modified activation function that operates in parallel with the SCARA robot model. Feed-Forward Neural Networks (FFNN) which have been trained online and offline have been used, without requiring any previous knowledge about the system to be identified. The activation function that is used in the hidden layer in FFNN is a modified version of the wavelet function. This approach ha

... Show More
Preview PDF
Publication Date
Thu Nov 21 2019
Journal Name
Journal Of Engineering
A Neural Networks based Predictive Voltage-Tracking Controller Design for Proton Exchange Membrane Fuel Cell Model
...Show More Authors

In this work, a new development of predictive voltage-tracking control algorithm for Proton Exchange Membrane Fuel Cell (PEMFCs) model, using a neural network technique based on-line auto-tuning intelligent algorithm was proposed. The aim of proposed robust feedback nonlinear neural predictive voltage controller is to find precisely and quickly the optimal hydrogen partial pressure action to control the stack terminal voltage of the (PEMFC) model for N-step ahead prediction. The Chaotic Particle Swarm Optimization (CPSO) implemented as a stable and robust on-line auto-tune algorithm to find the optimal weights for the proposed predictive neural network controller to improve system performance in terms of fast-tracking de

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Apr 20 2026
Journal Name
International Journal Of Intelligent Engineering And Systems
A Robust Base-layer Design for Hierarchical IoT Intrusion Detection Using Hybrid Deep Learning
...Show More Authors

The rapid development of Internet of Things (IoT) devices and their increasing numbers have caused a tremendous increase in network traffic and a wider range of cyber-attacks. This growing trend has complicated the detection process for traditional intrusion detection systems and heightened the challenges faced by these devices, such as imbalanced and large training data. This study presents a cohesive methodology of a series of intelligent techniques to prepare clean and balanced data for training the first (core) layer of a robust hierarchical intrusion detection system. The methodology was built by cleaning and compressing the data using an Autoencoder and preparing a strong latent space for balancing using a hybrid method that combines

... Show More
View Publication Preview PDF
Scopus
Publication Date
Thu Oct 01 2020
Journal Name
Key Engineering Materials
Optimization of Electrocoagulation Process for the TSS and Turbidity Removal in Al-Qadisiyah Water Treatment Plant in Baghdad City by Response Surface Methodology
...Show More Authors

Electrocoagulation process was employed for the treatment of river water flows in Iraq. In this study, a batch Electrocoagulation process was used to treat river water taken from Al - Qadisiyah water treatment plant. electrolysis time, voltage and inter-electrode spacing were the most important parameters to study . A statistical model was developed using the RSM model. The optimum condition after studying the parameter effect the process was 1 cm separating, 30 volts . The RSM model shows the ideal condition of removal for both the TSS and turbidity at 1 cm, 20 volts and 55 min.

View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Sun Dec 01 2024
Journal Name
Nordic Concrete Research
Evaluating Concrete Strength Under Various Curing Conditions Using Artificial Neural Networks
...Show More Authors
Abstract<p>This study examines the impact of different curing methods on the compressive strength of concrete. It investigates techniques such as air curing, periodic water spraying, full water submersion, and polyethylene encasement. Artificial neural network models were employed to evaluate the compressive strength under each curing condition. A model for calculating compressive strength that considers surrounding conditions was created using an artificial neural network. The current study’s figures were generated using this model. The research thoroughly examined the impact of curing environments and concrete mix components on strength properties, taking into account factors such as tempera</p> ... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Baghdad Science Journal
Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks
...Show More Authors

Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus,

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Science
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS
...Show More Authors

Scopus (3)
Scopus
Publication Date
Fri Mar 29 2024
Journal Name
Iraqi Journal Of Science
Biological versus Topological Domains in Improving the Reliability of Evolutionary-Based Protein Complex Detection Algorithms
...Show More Authors

     By definition, the detection of protein complexes that form protein-protein interaction networks (PPINs) is an NP-hard problem. Evolutionary algorithms (EAs), as global search methods, are proven in the literature to be more successful than greedy methods in detecting protein complexes. However, the design of most of these EA-based approaches relies on the topological information of the proteins in the PPIN. Biological information, as a key resource for molecular profiles, on the other hand, acquired a little interest in the design of the components in these EA-based methods. The main aim of this paper is to redesign two operators in the EA based on the functional domain rather than the graph topological domain. The perturb

... Show More
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Computers, Materials &amp; Continua
Credit Card Fraud Detection Using Improved Deep Learning Models
...Show More Authors

View Publication
Scopus (36)
Crossref (28)
Scopus Clarivate Crossref