Preferred Language
Articles
/
alkej-16
Neuro-Self Tuning Adaptive Controller for Non-Linear Dynamical Systems
...Show More Authors

In this paper, a self-tuning adaptive neural controller strategy for unknown nonlinear system is presented. The system considered is described by an unknown NARMA-L2 model and a feedforward neural network is used to learn the model with two stages. The first stage is learned off-line with two configuration serial-parallel model & parallel model to ensure that model output is equal to actual output of the system & to find the jacobain of the system. Which appears to be of critical importance parameter as it is used for the feedback controller and the second stage is learned on-line to modify the weights of the model in order to control the variable parameters that will occur to the system. A back propagation neural network is applied to learn the control structure for self-tuning PID type neuro-controller. Where the neural network is used to minimize the error function by adjusting the PID gains. Simulation results show that the self-tuning PID scheme can deal with a large unknown nonlinearity

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Journal Of Pakistan Association Of Dermatologists
Zinc as an essential element for normal immune reactions and as a therapeutic agent for autoimmune diseases
...Show More Authors

Scopus (1)
Scopus
Publication Date
Tue Dec 22 2020
Journal Name
Collaboration And Integration In Construction, Engineering, Management And Technology
A Hybrid Conceptual Model for BIM Adoption in Facilities Management: A Descriptive Analysis for the Collected Data
...Show More Authors

View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Dec 01 2021
Journal Name
International Journal Bioautomation
Model for Prediction of the Weight and Height Measurements of Patients with Disabilities for Diagnosis and Therapy
...Show More Authors

Background: Accurate measurement of a patient’s height and weight is an essential part of diagnosis and therapy, but there is some controversy as to how to calculate the height and weight of patients with disabilities. Objective: This study aims to use anthropometric measurements (arm span, length of leg, chest circumference, and waist circumference) to find a model (alternatives) that can allow the calculation of the height and the body weight of patients with disabilities. Additionally, a model for the prediction of weight and height measurements of patients with disabilities was established. Method: Four hander patients aged 20-80 years were enrolled in this study and divided into two groups, 210 (52.5%) male and 190 (47.5%) fe

... Show More
View Publication
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Jan 12 2016
Journal Name
Wireless Networks
Low communication cost (LCC) scheme for localizing mobile wireless sensor networks
...Show More Authors

In recent years, the number of applications utilizing mobile wireless sensor networks (WSNs) has increased, with the intent of localization for the purposes of monitoring and obtaining data from hazardous areas. Location of the event is very critical in WSN, as sensing data is almost meaningless without the location information. In this paper, two Monte Carlo based localization schemes termed MCL and MSL* are studied. MCL obtains its location through anchor nodes whereas MSL* uses both anchor nodes and normal nodes. The use of normal nodes would increase accuracy and reduce dependency on anchor nodes, but increases communication costs. For this reason, we introduce a new approach called low communication cost schemes to reduce communication

... Show More
View Publication
Scopus (34)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Baghdad Science Journal
Comparison of Faster R-CNN and YOLOv5 for Overlapping Objects Recognition
...Show More Authors

Classifying an overlapping object is one of the main challenges faced by researchers who work in object detection and recognition. Most of the available algorithms that have been developed are only able to classify or recognize objects which are either individually separated from each other or a single object in a scene(s), but not overlapping kitchen utensil objects. In this project, Faster R-CNN and YOLOv5 algorithms were proposed to detect and classify an overlapping object in a kitchen area.  The YOLOv5 and Faster R-CNN were applied to overlapping objects where the filter or kernel that are expected to be able to separate the overlapping object in the dedicated layer of applying models. A kitchen utensil benchmark image database and

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (17)
Scopus Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set
...Show More Authors

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
An Energy-Aware and Load-balancing Routing scheme for Wireless Sensor Networks
...Show More Authors

<p>Energy and memory limitations are considerable constraints of sensor nodes in wireless sensor networks (WSNs). The limited energy supplied to network nodes causes WSNs to face crucial functional limitations. Therefore, the problem of limited energy resource on sensor nodes can only be addressed by using them efficiently. In this research work, an energy-balancing routing scheme for in-network data aggregation is presented. This scheme is referred to as Energy-aware and load-Balancing Routing scheme for Data Aggregation (hereinafter referred to as EBR-DA). The EBRDA aims to provide an energy efficient multiple-hop routing to the destination on the basis of the quality of the links between the source and destination. In

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (11)
Scopus Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Prediction of penetration Rate and cost with Artificial Neural Network for Alhafaya Oil Field
...Show More Authors

Prediction of penetration rate (ROP) is important process in optimization of drilling due to its crucial role in lowering drilling operation costs. This process has complex nature due to too many interrelated factors that affected the rate of penetration, which make difficult predicting process. This paper shows a new technique of rate of penetration prediction by using artificial neural network technique. A three layers model composed of two hidden layers and output layer has built by using drilling parameters data extracted from mud logging and wire line log for Alhalfaya oil field. These drilling parameters includes mechanical (WOB, RPM), hydraulic (HIS), and travel transit time (DT). Five data set represented five formations gathered

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Baghdad Science Journal
Artificial Neural Network and Latent Semantic Analysis for Adverse Drug Reaction Detection
...Show More Authors

Adverse drug reactions (ADR) are important information for verifying the view of the patient on a particular drug. Regular user comments and reviews have been considered during the data collection process to extract ADR mentions, when the user reported a side effect after taking a specific medication. In the literature, most researchers focused on machine learning techniques to detect ADR. These methods train the classification model using annotated medical review data. Yet, there are still many challenging issues that face ADR extraction, especially the accuracy of detection. The main aim of this study is to propose LSA with ANN classifiers for ADR detection. The findings show the effectiveness of utilizing LSA with ANN in extracting AD

... Show More
View Publication Preview PDF
Scopus (14)
Crossref (9)
Scopus Crossref