Preferred Language
Articles
/
alkej-283
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is implemented based on hybrid Crossoved Firefly Algorithm with Artificial Bee Colony (CFA-ABC) to tune the controller's parameters to achieve the optimal path. The performance of the hybrid optimization algorithm is verified by various benchmark functions. The simulation results show that the utilizing of CFA and (CFA-ABC ) are better than the original Firefly Algorithm. A simulation example is given to indicate the effectiveness of the proposed algorithm, the results have been done using MATLAB (R2013b), and all trajectory tracking results with two reference trajectories (circular and lemniscates ) are presented.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Mar 23 2018
Journal Name
Entropy
Methods and Challenges in Shot Boundary Detection: A Review
...Show More Authors

View Publication
Scopus (65)
Crossref (59)
Scopus Clarivate Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Journal Of Southwest Jiaotong University
Integrity and Security in Cloud Computing Environment: A Review
...Show More Authors

Cloud computing is a newly developed concept that aims to provide computing resources in the most effective and economical manner. The fundamental idea of cloud computing is to share computing resources among a user group. Cloud computing security is a collection of control-based techniques and strategies that intends to comply with regulatory compliance rules and protect cloud computing-related information, data apps, and infrastructure. On the other hand, data integrity is a guarantee that the digital data are not corrupted, and that only those authorized people can access or modify them (i.e., maintain data consistency, accuracy, and confidence). This review presents an overview of cloud computing concepts, its importance in many

... Show More
View Publication
Crossref (9)
Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
Cost Reduction and Sustainable Business Practices; A conceptual approach
...Show More Authors

An excellent reputation earned by initiating and practicing sustainable business practices has additional benefits, of which are reducing environmental incidents and an improvement in operational efficiency as this has the potential to help firms improve on productivity and bring down operating costs. Taken further, with ever-increasing socially and environmentally-conscious investors and the public alike, this act of natural resources management could have a significant implication on market value and income of the practicing firms.

The above proposition has been supported by sustainable business practices literature that is continuously conversing and deliberating upon the impact of efficient resource d

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (14)
Crossref (16)
Scopus Crossref
Publication Date
Mon Sep 01 2025
Journal Name
Iranian Journal Of Nursing And Midwifery Research
Girls’ Experiences Regarding Obesity: A Qualitative Study in Iraq
...Show More Authors
Abstract<sec> <title>Background:

Obesity among girls can cause physical, psychological, or social problems. Different cultures have different lifestyle and dietary habits which affect people’s experience about obesity. This study aimed to assess girls’ experience toward obesity.

Materials and Methods:

In 2023, a qualitative conventional content analysis method was used in this study to meet the study’s objective in Baghdad and Babylon, Iraq. A probability purposive sampling method was used to gather the sample from three high schools in t

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Educational And Psychological Researches
Teaching skills for Public and Private Schools’ Teachers: comparative study : Teaching skills for Public and Private Schools’ Teachers: comparative study
...Show More Authors

Abstract:

The great expansion of teaching skills requires finding ways and methods to help teachers acquire experiences of all kinds. The researcher found in the subject of the teaching skills for teachers in public and private schools a fertile field for conducting a study that enables the measurement of these skills. Thus, the study aims to identify the skills of teaching lessons for teachers, the difference in teaching lesson skills for teachers according to the years of service, the differences in teaching lesson skills for teachers according to the specialized teachers and non-specialized teachers, the differences in teaching lesson skills for teachers according to the public and private school. The

... Show More
View Publication Preview PDF
Publication Date
Sat Feb 21 2026
Journal Name
Journal Of Physical Education
Standard Criteria for Some Special Abilities as Indicator for Selecting Iraqi Club&#39;s Weightlifters Aged 14 – 16 years Old
...Show More Authors

View Publication
Publication Date
Sat Jul 18 2020
Journal Name
College Of Islamic Sciences
Methodology of Bible Criticism of Muslim Scholars in South Africa Ali Safraz Khan Gumal as a sample
...Show More Authors

This paper and research paper analyzes the critical methodology of "Ali Khan Joommal “ about the Bible , directed in most of the textual criticism of the Torah, and its highest criticism is directed to both the Old and New Testaments.

Joommal  was distinguished by the mental methods and examples accompanying his era, while maintaining the general context in which Muslim scholars had previously followed, and he was distinguished from them by his many citations to the Western literature of Jews or Christians, in short it is a critical phenomenon worthy of study and evaluation.

View Publication Preview PDF
Publication Date
Fri Dec 15 2017
Journal Name
Journal Of Baghdad College Of Dentistry
Determination of Implant Primary Stability: A Comparison of the Surgeon’s Tactile Sense and Objective Measurements
...Show More Authors

Background: Evaluation and measurement of primary stability could be achieved by several methods, including the resonance frequency analysis (RFA) and implant insertion torque (IT) values. The need for a sufficient primary stability, guaranteed by an adequate insertion torque and implant stability quotient values, increased its importance mainly in one stage implants or in immediate loading protocols. The aims of this study was to find if there is a correlation between the peak insertion torque (PIT) and ISQ values of implants inserted in the jaws of different bone quality which regarded as two important clinical determinant factors for prediction of implant primary stability, and to evaluate and compare whether an experienced clinician cou

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 03 2015
Journal Name
Al-kindy College Medical Journal
Aneurysmal bone cyst of the lateral end of clavicle in a twelfth year old girl Case study
...Show More Authors

Introduction: An aneurysmal bone cyst are enigmatic lesion of unknown cause and presentation and are difficult to distinguish from other lesions, it is a benign, but expansible tumor like lesion that generally occurs in the long bones. An aneurysmal bone cyst arising from the flat bone like clavicle is rare . Case presentation: We report a 12-year-old girl child with an aneurysmal bone cyst of the lateral third of left clavicle treated with enblock resection. The pathologic findings confirmed the diagnosis of aneurysmal bone cyst. The patient has been followed up for one year with no evidence of recurrence . Conclusion: En bloc resection can be curative and provide good results for this rare type of clavicle tumour.

View Publication Preview PDF