Preferred Language
Articles
/
bBbdFooBVTCNdQwCtpC9
Single channel informed signal separation using artificial-stereophonic mixtures and exemplar-guided matrix factor deconvolution
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Aug 17 2022
Journal Name
Applied Sciences
Predicting Fruit’s Sweetness Using Artificial Intelligence—Case Study: Orange
...Show More Authors

The manual classification of oranges according to their ripeness or flavor takes a long time; furthermore, the classification of ripeness or sweetness by the intensity of the fruit’s color is not uniform between fruit varieties. Sweetness and color are important factors in evaluating the fruits, the fruit’s color may affect the perception of its sweetness. This article aims to study the possibility of predicting the sweetness of orange fruits based on artificial intelligence technology by studying the relationship between the RGB values of orange fruits and the sweetness of those fruits by using the Orange data mining tool. The experiment has applied machine learning algorithms to an orange fruit image dataset and performed a co

... Show More
View Publication Preview PDF
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2022
Journal Name
Energy Reports
Thermal effectiveness of solar collector using Graphene nanostructures suspended in ethylene glycol–water mixtures
...Show More Authors

View Publication
Scopus (20)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Thu Jun 20 2019
Journal Name
Baghdad Science Journal
Using Backpropagation to Predict Drought Factor in Keetch-Byram Drought Index
...Show More Authors

Forest fires continue to rise during the dry season and they are difficult to stop. In this case, high temperatures in the dry season can cause an increase in drought index that could potentially burn the forest every time. Thus, the government should conduct surveillance throughout the dry season. Continuous surveillance without the focus on a particular time becomes ineffective and inefficient because of preventive measures carried out without the knowledge of potential fire risk. Based on the Keetch-Byram Drought Index (KBDI), formulation of Drought Factor is used just for calculating the drought today based on current weather conditions, and yesterday's drought index. However, to find out the factors of drought a day after, the data

... Show More
View Publication Preview PDF
Clarivate Crossref
Publication Date
Fri Jan 01 2016
Journal Name
International Journal Of Chemical Engineering
Microbubble Distillation for Ethanol-Water Separation
...Show More Authors

In the current study, a novel approach for separating ethanol-water mixture by microbubble distillation technology was investigated. Traditional distillation processes require large amounts of energy to raise the liquid to its boiling point to effect removal of volatile components. The concept of microbubble distillation by comparison is to heat the gas phase rather than the liquid phase to achieve separation. The removal of ethanol from the thermally sensitive fermentation broths was taken as a case of study. Consequently the results were then compared with those which could be obtained under equilibrium conditions expected in an “ideal” distillation unit. Microbubble distillation has achieved vapour compositions higher than th

... Show More
View Publication
Scopus (20)
Crossref (15)
Scopus Crossref
Publication Date
Mon Jun 01 2009
Journal Name
2009 Etp International Conference On Future Computer And Communication
Signal Processing Techniques for Robust Spectrum Sensing
...Show More Authors

Cognitive radios have the potential to greatly improve spectral efficiency in wireless networks. Cognitive radios are considered lower priority or secondary users of spectrum allocated to a primary user. Their fundamental requirement is to avoid interference to potential primary users in their vicinity. Spectrum sensing has been identified as a key enabling functionality to ensure that cognitive radios would not interfere with primary users, by reliably detecting primary user signals. In addition, reliable sensing creates spectrum opportunities for capacity increase of cognitive networks. One of the key challenges in spectrum sensing is the robust detection of primary signals in highly negative signal-to-noise regimes (SNR).In this paper ,

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Al-khwarizmi Engineering Journal
Biodegradation of Diesel Contaminated Soil Using Single Bacterial Strains and a Mixed Bacterial Consortium
...Show More Authors

This study was conducted to assess the hydrocarbon degradation abilities of Sphingomonas paucimobilis, Pentoae species, Staphylococcus aureus, and Enterobacter cloacae, which isolated from diesel contaminated soil samples. Single strains and mixed bacterial consortia have been investigated their ability to degrade 1.0 % (v/v) of diesel oil in Bushnell- Haas medium as sole.carbon.and.energy.source. At temperature 30C, the individual.bacterial.isolates exhibited low growth and low degradation.than did the.mixed. bacterial.culture. After 28 days.of incubation the.combination.of four isolates degraded.an upper limit.of diesel  88.4%. This was. continued.by 85.1% by S. paucimobilis, 84 % by Pentoae sp., 79% by S.aureus, and

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
An Analytic Solution for Riccati Matrix Delay Differential Equation using Coupled Homotopy-Adomian Approach
...Show More Authors

An efficient modification and a novel technique combining the homotopy concept with  Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced  in this paper  . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Thu Dec 28 2017
Journal Name
Al-khwarizmi Engineering Journal
Obstacles Avoidance for Mobile Robot Using Enhanced Artificial Potential Field
...Show More Authors

In this paper, an enhanced artificial potential field (EAPF) planner is introduced. This planner is proposed to rapidly find online solutions for the mobile robot path planning problems, when the underlying environment contains obstacles with unknown locations and sizes. The classical artificial potential field represents both the repulsive force due to the detected obstacle and the attractive force due to the target. These forces can be considered as the primary directional indicator for the mobile robot. However, the classical artificial potential field has many drawbacks. So, we suggest two secondary forces which are called the midpoint

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More