Preferred Language
Articles
/
YRfzV5IBVTCNdQwCrKzf
Microwave Nondestructive Testing for Defect Detection in Composites Based on K-Means Clustering Algorithm
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Mon Apr 26 2021
Journal Name
Journal Of Electrical Engineering & Technology
ANFIS Based Reinforcement Learning Strategy for Control A Nonlinear Coupled Tanks System
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Mar 25 2014
Journal Name
Sensors
Minimal Camera Networks for 3D Image Based Modeling of Cultural Heritage Objects
...Show More Authors

View Publication
Scopus (38)
Crossref (28)
Scopus Clarivate Crossref
Publication Date
Sun Jul 01 2012
Journal Name
Applied Soft Computing
A new evolutionary based routing protocol for clustered heterogeneous wireless sensor networks
...Show More Authors

Scopus (246)
Crossref (202)
Scopus Clarivate Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Ieee Transactions On Industrial Electronics
Singular Perturbation-Based Adaptive Integral Sliding Mode Control for Flexible Joint Robots
...Show More Authors

The flexible joint robot (FJR) typically experiences parametric variations, nonlinearities, underactuation, noise propagation, and external disturbances which seriously degrade the FJR tracking. This article proposes an adaptive integral sliding mode controller (AISMC) based on a singular perturbation method and two state observers for the FJR to achieve high performance. First, the underactuated FJR is modeled into two simple second-order fast and slow subsystems by using Olfati transformation and singular perturbation method, which handles underactuation while reducing noise amplification. Then, the AISMC is proposed to effectively accomplish the desired tracking performance, in which the integral sliding surface is designed to reduce cha

... Show More
View Publication
Scopus (43)
Crossref (41)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Engineering
A An Authentication and Access Control Model for Healthcare based Cloud Services
...Show More Authors

Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our s

... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (18)
Crossref (13)
Scopus Crossref
Publication Date
Wed Apr 25 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Counting Functions to Generate The Primes in the RSA Algorithm and Diffie-Hellman Key Exchange
...Show More Authors

        The Rivest–Shamir–Adleman (RSA) and the Diffie-Hellman (DH) key exchange are famous methods for encryption. These methods  depended on selecting the primes p and q in order  to be secure enough . This paper shows that the named methods used the primes which are found by some arithmetical function .In the other sense, no need to think about getting primes p and q and how they are secure enough, since the arithmetical function enable to build the primes in such complicated way to be secure. Moreover, this article   gives  new construction  of the  RSA  algorithm and DH key  exchange using the

primes p,qfrom areal number x.

View Publication Preview PDF
Crossref
Publication Date
Sun Apr 23 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Design an Algorithm to Calculate the Inverse Permutations Of the Symmetric Group Sn In Computer
...Show More Authors

  The search is an application for one of the problems of mathematics in the computer; as providing construction and design of a major program to calculate the inverse permutations of the symmetric group Sn , where 1 ≤ n ≤ 13; using some of the methods used in the Number Theory by computer . Also the research includes design flow chart for the main program and design flow chart for the program inverse permutations and we give some illustrative examples for different symmetric groups and their inverse permutations.

View Publication Preview PDF
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
The Use Of Genetic Algorithm In Estimating The Parameter Of Finite Mixture Of Linear Regression
...Show More Authors

The estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To

... Show More
View Publication
Crossref
Publication Date
Mon Oct 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Robot Path Planning in Unknown Environments with Multi-Objectives Using an Improved COOT Optimization Algorithm
...Show More Authors

Scopus (9)
Crossref (2)
Scopus Crossref