Preferred Language
Articles
/
alkej-477
Bionics-Based Approach for Object Tracking to Implement in Robot Applications
...Show More Authors

In this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based on suggested logical rules. In smooth pursuit phase, the object is kept in the center area of the field of the view by smooth adjusting the values of the pan and tilt angles where this stage is analogue to putting the observing object in the fovea centralis of the oculomotor system. The proposed approach was implemented by using (Camera-Pan / Tilt) configuration and showed good results to improve the vision capability of the humanoid robots.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 22 2026
Journal Name
International Journal Of Engineering & Technology
An integrated multi layers approach for detecting unknown malware behaviours
...Show More Authors

Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi – layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning system for malware infection, Malware data base within malware samples as a second layer, Cuckoo as a third layer, Bull guard as a fourth layer and IDA pro as a fifth layer. The results showed that the use of fifth layers was better than the use of a single detector without merging. For example, the efficiency of the proposed approach is 100% compared with 18% and 63% of Virus Total and Bel

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Pure And Applied Mathematics
Linear Regression Model Using Bayesian Approach for Iraqi Unemployment Rate
...Show More Authors

In this paper we used frequentist and Bayesian approaches for the linear regression model to predict future observations for unemployment rates in Iraq. Parameters are estimated using the ordinary least squares method and for the Bayesian approach using the Markov Chain Monte Carlo (MCMC) method. Calculations are done using the R program. The analysis showed that the linear regression model using the Bayesian approach is better and can be used as an alternative to the frequentist approach. Two criteria, the root mean square error (RMSE) and the median absolute deviation (MAD) were used to compare the performance of the estimates. The results obtained showed that the unemployment rates will continue to increase in the next two decade

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
New Approach for Solving Three Dimensional Space Partial Differential Equation
...Show More Authors

This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.

       Finally, all algori

... Show More
View Publication Preview PDF
Scopus (23)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Tue Aug 30 2016
Journal Name
Mechanical Engineering
The Effect of Different Furrow Depths and Speeds of Machinary Units Using A Locally Assembled Combine Implement on Planting Maize
...Show More Authors

View Publication
Publication Date
Sun Jun 02 2024
Journal Name
Journal Of Administration And Economics
مؤشرات مقترحة لتقييم الاستدامة المالية للجامعات العراقية
...Show More Authors

View Publication
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sun Jun 23 2024
Journal Name
Asee Annual Conference And Exposition
Undergraduate Research Impact on Students' Retention and Academic Development Based on Their Study Field and the Mentoring Approach
...Show More Authors

The impact of undergraduate research experiences on students' academic development and retention in STEM fields is significant. Students' success in STEM fields is based on developing strong research and critical thinking skills that make it essential for students to engage in research activities throughout their academic programs. This work evaluates the effectiveness of undergraduate research experiences with respect to its influence on student retention and academic development. The cases presented are based on years of experience implementing undergraduate research programs in various STEM fields at Colorado State University Pueblo (CSU Pueblo) funded by HSI STEM Grants. The study seeks to establish a correlation between students' reten

... Show More
Scopus (1)
Scopus
Publication Date
Tue Oct 28 2025
Journal Name
Series On Biomechanics
Design and fabrication of bidirectional soft actuator for prosthetic hand applications
...Show More Authors

Objective: In this work we design and evaluate a bidirectional pneumatic soft actuator made from silicone rubber (RTV2 C10) for the use in prosthetic hand. The actuator aimed to enhance flexibility and provide motion in two directions that mimic the actions of the human fingers. Materials and Methods: Two parallel air chambers are used in the actuator design where each chamber is divided into smaller internal cavities. These chambers are linked through a narrow connecting channel. The fabrication process relied on a molding technique based on 3D printed molds. Three separate mold components were designed and printed to allow accurate casting of silicone rubber into the desired shape. The completed actuators were then tested using an experim

... Show More
View Publication
Scopus Crossref
Publication Date
Sat Jan 13 2018
Journal Name
Journal Of Engineering
Performance Evaluation of RIPng, EIGRPv6 and OSPFv3 for Real Time Applications
...Show More Authors

In this modern Internet era and the transition to IPv6, routing protocols must adjust to assist this transformation. RIPng, EIGRPv6 and OSPFv3 are the dominant IPv6 IGRP (Interior Gateway Routing Protocols). Selecting the best routing protocol among the available is a critical task, which depends upon the network requirement and performance parameters of different real time applications. The primary motivation of this paper is to estimate the performance of these protocols in real time applications. The evaluation is based on a number of criteria including:  network convergence duration, Http Page Response Time, DB Query Response Time, IPv6 traffic dropped, video packet delay variation and video packet end to end de

... Show More
View Publication Preview PDF
Publication Date
Sat Jul 20 2024
Journal Name
Journal Of Interdisciplinary Mathematics
Analytical solutions via coupled Elzaki adomian decomposition method for some applications
...Show More Authors

An efficient combination of Adomian Decomposition iterative technique coupled Elzaki transformation (ETADM) for solving Telegraph equation and Riccati non-linear differential equation (RNDE) is introduced in a novel way to get an accurate analytical solution. An elegant combination of the Elzaki transform, the series expansion method, and the Adomian polynomial. The suggested method will convert differential equations into iterative algebraic equations, thus reducing processing and analytical work. The technique solves the problem of calculating the Adomian polynomials. The method’s efficiency was investigated using some numerical instances, and the findings demonstrate that it is easier to use than many other numerical procedures. It has

... Show More
Scopus (4)
Scopus