Preferred Language
Articles
/
alkej-813
BCI-Based Smart Room Control using EEG Signals
...Show More Authors

In this paper, we implement and examine a Simulink model with electroencephalography (EEG) to control many actuators based on brain waves. This will be in great demand since it will be useful for certain individuals who are unable to access some control units that need direct contact with humans. In the beginning, ten volunteers of a wide range of (20-66) participated in this study, and the statistical measurements were first calculated for all eight channels. Then the number of channels was reduced by half according to the activation of brain regions within the utilized protocol and the processing time also decreased. Consequently, four of the participants (three males and one female) were chosen to examine the Simulink model during different actions. The model contained: input signals, data selection according to the activation regions in the brain, features extraction, classification according to the frequency ranges of each action, and an interface with an embedded system to control the actuators.

 

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Oct 01 2022
Journal Name
Baghdad Science Journal
Human Face Recognition Based on Local Ternary Pattern and Singular Value Decomposition
...Show More Authors

There is various human biometrics used nowadays, one of the most important of these biometrics is the face. Many techniques have been suggested for face recognition, but they still face a variety of challenges for recognizing faces in images captured in the uncontrolled environment, and for real-life applications. Some of these challenges are pose variation, occlusion, facial expression, illumination, bad lighting, and image quality. New techniques are updating continuously. In this paper, the singular value decomposition is used to extract the features matrix for face recognition and classification. The input color image is converted into a grayscale image and then transformed into a local ternary pattern before splitting the image into

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Feb 04 2022
Journal Name
Neuroquantology
Detecting Damaged Buildings on Post-Hurricane Satellite Imagery based on Transfer Learning
...Show More Authors

In this article, Convolution Neural Network (CNN) is used to detect damage and no damage images form satellite imagery using different classifiers. These classifiers are well-known models that are used with CNN to detect and classify images using a specific dataset. The dataset used belongs to the Huston hurricane that caused several damages in the nearby areas. In addition, a transfer learning property is used to store the knowledge (weights) and reuse it in the next task. Moreover, each applied classifier is used to detect the images from the dataset after it is split into training, testing and validation. Keras library is used to apply the CNN algorithm with each selected classifier to detect the images. Furthermore, the performa

... Show More
View Publication
Scopus (3)
Scopus Crossref
Publication Date
Wed Mar 29 2023
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Multi-Stage Hydraulic Fracturing Completion Design Based on Ball-and-Sleeve Method
...Show More Authors

This paper proposes a completion that can allow fracturing four zones in a single trip in the well called “Y” (for confidential reasons) of the field named “X” (for confidential reasons). The steps to design a well completion for multiple fracturing are first to select the best completion method then the required equipment and the materials that it is made of. After that, the completion schematic must be drawn by using Power Draw in this case, and the summary installation procedures explained. The data used to design the completion are the well trajectory, the reservoir data (including temperature, pressure and fluid properties), the production and injection strategy. The results suggest that multi-stage hydraulic fracturing can

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Computers, Materials & Continua
An Optimal Method for Supply Chain Logistics Management Based on Neural Network
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
IFFT-Based Microwave Non-Destructive Testing for Delamination Detection and Thickness Estimation
...Show More Authors

View Publication
Scopus (14)
Crossref (14)
Scopus Clarivate Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Fast Shot Boundary Detection Based on Separable Moments and Support Vector Machine
...Show More Authors

View Publication
Scopus (24)
Crossref (22)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Européen Des Systèmes Automatisés​
An IoT and Machine Learning-Based Predictive Maintenance System for Electrical Motors
...Show More Authors

The rise of Industry 4.0 and smart manufacturing has highlighted the importance of utilizing intelligent manufacturing techniques, tools, and methods, including predictive maintenance. This feature allows for the early identification of potential issues with machinery, preventing them from reaching critical stages. This paper proposes an intelligent predictive maintenance system for industrial equipment monitoring. The system integrates Industrial IoT, MQTT messaging and machine learning algorithms. Vibration, current and temperature sensors collect real-time data from electrical motors which is analyzed using five ML models to detect anomalies and predict failures, enabling proactive maintenance. The MQTT protocol is used for efficient com

... Show More
View Publication
Scopus (23)
Crossref (13)
Scopus Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Al-khwarizmi Engineering Journal
BER Performance Improvement of Dual Chaotic Maps Based on STBC Communication System
...Show More Authors

Sensitive information of any multimedia must be encrypted before transmission. The dual chaotic algorithm is a good option to encrypt sensitive information by using different parameters and different initial conditions for two chaotic maps. A dual chaotic framework creates a complex chaotic trajectory to prevent the illegal use of information from eavesdroppers. Limited precisions of a single chaotic map cause a degradation in the dynamical behavior of the communication system. To overcome this degradation issue in, a novel form of dual chaos map algorithm is analyzed. To maintain the stability of the dynamical system, the Lyapunov Exponent (LE) is determined for the single and dual maps. In this paper, the LE of the single and dual maps

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Fme Transactions
Development of automated liquid filling system based on the interactive design approach
...Show More Authors

The automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve

... Show More
View Publication
Scopus (18)
Crossref (16)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2013
Journal Name
Diyala Journal Of Engineering Sciences
Design and Simulation of parallel CDMA System Based on 3D-Hadamard Transform
...Show More Authors

Future wireless systems aim to provide higher transmission data rates, improved spectral efficiency and greater capacity. In this paper a spectral efficient two dimensional (2-D) parallel code division multiple access (CDMA) system is proposed for generating and transmitting (2-D CDMA) symbols through 2-D Inter-Symbol Interference (ISI) channel to increase the transmission speed. The 3D-Hadamard matrix is used to generate the 2-D spreading codes required to spread the two-dimensional data for each user row wise and column wise. The quadrature amplitude modulation (QAM) is used as a data mapping technique due to the increased spectral efficiency offered. The new structure simulated using MATLAB and a comparison of performance for ser

... Show More
View Publication Preview PDF
Crossref