Preferred Language
Articles
/
alkej-283
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is implemented based on hybrid Crossoved Firefly Algorithm with Artificial Bee Colony (CFA-ABC) to tune the controller's parameters to achieve the optimal path. The performance of the hybrid optimization algorithm is verified by various benchmark functions. The simulation results show that the utilizing of CFA and (CFA-ABC ) are better than the original Firefly Algorithm. A simulation example is given to indicate the effectiveness of the proposed algorithm, the results have been done using MATLAB (R2013b), and all trajectory tracking results with two reference trajectories (circular and lemniscates ) are presented.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Sep 15 2021
Journal Name
2021 International Conference On Computing And Communications Applications And Technologies (i3cat)
Parallel Hybrid String Matching Algorithm Using CUDA API Function
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Sun May 01 2022
Journal Name
Journal Of Engineering
Estimating Pitting Corrosion Depth and Density on Carbon Steel (C-4130) using Artificial Neural Networks
...Show More Authors

The purpose of this research is to investigate the impact of corrosive environment (corrosive ferric chloride of 1, 2, 5, 6% wt. at room temperature), immersion period of (48, 72, 96, 120, 144 hours), and surface roughness on pitting corrosion characteristics and use the data to build an artificial neural network and test its ability to predict the depth and intensity of pitting corrosion in a variety of conditions. Pit density and depth were calculated using a pitting corrosion test on carbon steel (C-4130). Pitting corrosion experimental tests were used to develop artificial neural network (ANN) models for predicting pitting corrosion characteristics. It was found that artificial neural network models were shown to be

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 30 2021
Journal Name
Eastern-european Journal Of Enterprise Technologies
Implementation of artificial neural network to achieve speed control and power saving of a belt conveyor system
...Show More Authors

According to the importance of the conveyor systems in various industrial and service lines, it is very desirable to make these systems as efficient as possible in their work. In this paper, the speed of a conveyor belt (which is in our study a part of an integrated training robotic system) is controlled using one of the artificial intelligence methods, which is the Artificial Neural Network (ANN). A visions sensor will be responsible for gathering information about the status of the conveyor belt and parts over it, where, according to this information, an intelligent decision about the belt speed will be taken by the ANN controller. ANN will control the alteration in speed in a way that gives the optimized energy efficiency through

... Show More
View Publication
Scopus (18)
Crossref (9)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
International Journal Of Civil Engineering And Technology (ijciet)
Performance assessment of biological treatment of sequencing batch reactor using artificial neural network technique.
...Show More Authors

Artificial Neural Network (ANN) model's application is widely increased for wastewater treatment plant (WWTP) variables prediction and forecasting which can enable the operators to take appropriate action and maintaining the norms. It is much easier modeling tool for dealing with complex nature WWTP modeling comparing with other traditional mathematical models. ANN technique significance has been considered at present study for the prediction of sequencing batch reactor (SBR) performance based on effluent's (BOD5/COD) ratio after collecting the required historical daily SBR data for two years operation (2015-2016) from Baghdad Mayoralty and Al-Rustamiya WWTP office, Iraq. The prediction was gotten by the application of a feed-forwa

... Show More
Publication Date
Mon Aug 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
design Electronic cost accounting system for the Iraqi Airways Company
...Show More Authors

The research Was based to on a real problem and realistically of represented by that  Iraqi Airways company does not have the electronic cost accounting system and therefore  be the process of  the pricing various services provided by a company sample research respecting  air transport and air cargo and aviation fuel and services and catering are not properly especially in the presence of new data from the new companies entering competition in Iraqi aviation industry and therefore does not provide price flexibility in order to compete in getting market share, And then research this problem addressed through design an electronic cost Accounting system covers all the costs incurred by the compan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Mar 15 2022
Journal Name
Al-academy
The Graphic privacy in vector graphics design for children's publications
...Show More Authors

         The graphic privacy feature is one of the most important specifications for the existence of any type of design achievements alike, which is one of the graphic products with its multiple data, and from here the current research investigates the graphic privacy of vector graphics design with all its technical descriptions and concepts associated with it and the possibility of achieving it to the best that it should be from Where its formal structure in children's publications, where the structural structure of the current research came from the first chapter, which contained the research problem, which came according to the following question: What is the graphic privacy in the design of vector graphics in children's publ

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Design of L-Band Multiwavelength Laser for TDM/WDM PON Application
...Show More Authors

This paper presents on the design of L-Band Multiwavelength laser for Hybrid Time Division Multiplexing/ Wavelength Division Multiplexing (TDM/WDM) Passive Optical Network (PON) application. In this design, an L-band Mulltiwavelength Laser is designed as the downstream signals for TDM/WDM PON. The downstream signals ranging from 1569.865 nm to 1581.973 nm with 100GHz spacing. The multiwavelength laser is designed using OptiSystem software and it is integrated into a TDM/WDM PON that is also designed using OptiSystem simulation software. By adapting multiwavelength fiber laser into a TDM/WDM network, a simple and low-cost downstream signal is proposed. From the simulation design, it is found that the proposed design is suitable to be used

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Ieee Xplore
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
...Show More Authors

Cryptography algorithms play a critical role in information technology against various attacks witnessed in the digital era. Many studies and algorithms are done to achieve security issues for information systems. The high complexity of computational operations characterizes the traditional cryptography algorithms. On the other hand, lightweight algorithms are the way to solve most of the security issues that encounter applying traditional cryptography in constrained devices. However, a symmetric cipher is widely applied for ensuring the security of data communication in constraint devices. In this study, we proposed a hybrid algorithm based on two cryptography algorithms PRESENT and Salsa20. Also, a 2D logistic map of a chaotic system is a

... Show More
Scopus (30)
Crossref (15)
Scopus Crossref
Publication Date
Wed Mar 15 2023
Journal Name
Al-academy
Active design and its principles in industrial product design
...Show More Authors

 The problem of the research came through the following question (what is the effectiveness of active design in contemporary industrial products), and it emphasized the importance of research to make society with its members in a positive state of activity, and what can help the industrial product design to achieve this, but the goal of the study is (determining the characteristics and principles of design Active and its effectiveness in the industrial product), and the study was determined by industrial products related to daily, recreational and sports activity, The researcher relied on a form to determine the axes of analysis for the sample models, in order to reach the results of the research, the most important of which are: Realiz

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Apr 15 2016
Journal Name
International Journal Of Computer Applications
Hybrid Techniques based Speech Recognition
...Show More Authors

Information processing has an important application which is speech recognition. In this paper, a two hybrid techniques have been presented. The first one is a 3-level hybrid of Stationary Wavelet Transform (S) and Discrete Wavelet Transform (W) and the second one is a 3-level hybrid of Discrete Wavelet Transform (W) and Multi-wavelet Transforms (M). To choose the best 3-level hybrid in each technique, a comparison according to five factors has been implemented and the best results are WWS, WWW, and MWM. Speech recognition is performed on WWS, WWW, and MWM using Euclidean distance (Ecl) and Dynamic Time Warping (DTW). The match performance is (98%) using DTW in MWM, while in the WWS and WWW are (74%) and (78%) respectively, but when using (

... Show More
View Publication
Crossref