Preferred Language
Articles
/
VRf3kI8BVTCNdQwCgHvV
An Optimized Approach for Industrial IoT Based on Edge Computing
...Show More Authors

The Internet of Things (IoT) is an information network that connects gadgets and sensors to allow new autonomous tasks. The Industrial Internet of Things (IIoT) refers to the integration of IoT with industrial applications. Some vital infrastructures, such as water delivery networks, use IIoT. The scattered topology of IIoT and resource limits of edge computing provide new difficulties to traditional data storage, transport, and security protection with the rapid expansion of the IIoT. In this paper, a recovery mechanism to recover the edge network failure is proposed by considering repair cost and computational demands. The NP-hard problem was divided into interdependent major and minor problems that could be solved in polynomial time by using the Benders decomposition technique and cutting plane approximation. To ensure the nonincreasing character of the Benders upper limit, a local branching method was also added to improve the convergence. Simulation results indicated that the proposed method is superior to the existing method and has better overall performance.

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Apr 01 2025
Journal Name
Mesopotamian Journal Of Cybersecurity
The Impact of Feature Importance on Spoofing Attack Detection in IoT Environment
...Show More Authors

The Internet of Things (IoT) is an expanding domain that can revolutionize different industries. Nevertheless, security is among the multiple challenges that it encounters. A major threat in the IoT environment is spoofing attacks, a type of cyber threat in which malicious actors masquerade as legitimate entities. This research aims to develop an effective technique for detecting spoofing attacks for IoT security by utilizing feature-importance methods. The suggested methodology involves three stages: preprocessing, selection of important features, and classification. The feature importance determines the most significant characteristics that play a role in detecting spoofing attacks. This is achieved via two techniques: decision tr

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Applied Sciences
Leading Edge Blowing to Mimic and Enhance the Serration Effects for Aerofoil
...Show More Authors

Leading edge serration is now a well-established and effective passive control device for the reduction of turbulence–leading edge interaction noise, and for the suppression of boundary layer separation at high angle of attack. It is envisaged that leading edge blowing could produce the same mechanisms as those produced by a serrated leading edge to enhance the aeroacoustics and aerodynamic performances of aerofoil. Aeroacoustically, injection of mass airflow from the leading edge (against the incoming turbulent flow) can be an effective mechanism to decrease the turbulence intensity, and/or alter the stagnation point. According to classical theory on the aerofoil leading edge noise, there is a potential for the leading edge blowi

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Improving of Design Parameters of an Industrial Continuous Catalytic Reforming Reactors
...Show More Authors

Catalytic reforming of naphtha occupies an important issue in refineries for obtaining high octane gasoline and aromatic compounds, which are the basic materials of petrochemical industries. In this study, a novel of design parameters for industrial continuous catalytic reforming reactors of naphtha is proposed to increase the aromatics and hydrogen productions. Improving a rigorous mathematical model for industrial catalytic reactors of naphtha is studied here based on industrial data applying a new kinetic and deactivation model. The optimal design variables are obtained utilizing the optimization process in order to build the model with high accuracy and such design parameters are then applied to get the best configuration of this pro

... Show More
View Publication Preview PDF
Publication Date
Sun Feb 10 2019
Journal Name
Journal Of The College Of Education For Women
An Application Domain Based on General Object Oriented Software Models
...Show More Authors

Any software application can be divided into four distinct interconnected domains namely, problem domain, usage domain, development domain and system domain. A methodology for assistive technology software development is presented here that seeks to provide a framework for requirements elicitation studies together with their subsequent mapping implementing use-case driven object-oriented analysis for component based software architectures. Early feedback on user interface components effectiveness is adopted through process usability evaluation. A model is suggested that consists of the three environments; problem, conceptual, and representational environments or worlds. This model aims to emphasize on the relationship between the objects

... Show More
View Publication Preview PDF
Publication Date
Mon Mar 01 2021
Journal Name
Iop Conference Series: Materials Science And Engineering
An efficient multistage CBIR based on Squared Krawtchouk-Tchebichef polynomials
...Show More Authors
Abstract<p>Image databases are increasing exponentially because of rapid developments in social networking and digital technologies. To search these databases, an efficient search technique is required. CBIR is considered one of these techniques. This paper presents a multistage CBIR to address the computational cost issues while reasonably preserving accuracy. In the presented work, the first stage acts as a filter that passes images to the next stage based on SKTP, which is the first time used in the CBIR domain. While in the second stage, LBP and Canny edge detectors are employed for extracting texture and shape features from the query image and images in the newly constructed database. The p</p> ... Show More
View Publication
Crossref (4)
Crossref
Publication Date
Mon Sep 01 2014
Journal Name
19th International Conference On Methods And Models In Automation And Robotics (mmar) 2014
A PSO-optimized type-2 fuzzy logic controller for navigation of multiple mobile robots
...Show More Authors

Scopus (22)
Crossref (20)
Scopus Crossref
Publication Date
Sun Feb 02 2025
Journal Name
Engineering, Technology &amp; Applied Science Research
An Enhanced Document Source Identification System for Printer Forensic Applications based on the Boosted Quantum KNN Classifier
...Show More Authors

Document source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Tue Dec 31 2013
Journal Name
Al-khwarizmi Engineering Journal
Design of an Adaptive PID Neural Controller for Continuous Stirred Tank Reactor based on Particle Swarm Optimization
...Show More Authors

 A particle swarm optimization algorithm and neural network like self-tuning PID controller for CSTR system is presented. The scheme of the discrete-time PID control structure is based on neural network and tuned the parameters of the PID controller by using a particle swarm optimization PSO technique as a simple and fast training algorithm. The proposed method has advantage that it is not necessary to use a combined structure of identification and decision because it used PSO. Simulation results show the effectiveness of the proposed adaptive PID neural control algorithm in terms of minimum tracking error and smoothness control signal obtained for non-linear dynamical CSTR system.

View Publication Preview PDF
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
An Efficient Shrinkage Estimators For Generalized Inverse Rayleigh Distribution Based On Bounded And Series Stress-Strength Models
...Show More Authors
Abstract<p>In this paper, we investigate two stress-strength models (Bounded and Series) in systems reliability based on Generalized Inverse Rayleigh distribution. To obtain some estimates of shrinkage estimators, Bayesian methods under informative and non-informative assumptions are used. For comparison of the presented methods, Monte Carlo simulations based on the Mean squared Error criteria are applied.</p>
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Digital Signal Processing
Reverberant signal separation using optimized complex sparse nonnegative tensor deconvolution on spectral covariance matrix
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref