Preferred Language
Articles
/
bRenWJABVTCNdQwCyYfk
A carbon nanotubes photoconductive detector for middle and far infrared regions based on porous silicon and a polyamide nylon polymer
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 02 2019
Journal Name
Journal Of Educational And Psychological Researches
A training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students
...Show More Authors

       The current research aims to build a training program for chemistry teachers based on the knowledge economy and its impact on the productive thinking of their students. To achieve the objectives of the research, the following hypothesis was formulated:

   There is no statistically significant difference at (0.05) level of significance between the average grades of the students participating in the training program according to the knowledge economy and the average grades of the students who did not participate in the training program in the test of productive thinking. The study sample consisted of (288) second intermediate grade students divided into (152) for the control group

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Engineering
A Cognition Path Planning with a Nonlinear Controller Design for Wheeled Mobile Robot Based on an Intelligent Algorithm
...Show More Authors

This paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
BEHAVIOR OF CONCRETE BEAMS REINFORCED IN SHEAR WITH CARBON FIBER REINFORCED POLYMER
...Show More Authors

Carbon fiber reinforced polymers (CFRP) were widely used in strengthening reinforced concrete members
in the last few years, these fibers consist mainly of high strength fibers which increase the member capacity in addition to changing the mode of failure of the reinforced concrete beams. Experimental and theoretical investigations were carried to find the behavior of reinforced concrete beams strengthened by CFRP in shear and bending. The experimental work included testing of 12 beams divided into 4 groups; each group contains 3 beams. The following parameters were taken into consideration: - Concrete crushing strength. - CFRP strengthening location (shear strengthening and both shear and flexure strengthening). Reinforced beams were

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ELECTROCHEMICAL PREPARATION OF A MOLECULAR IMPRINTED POLYMER ELECTRODE FOR ESTEMATION OF ASPIRIN USING TWO DIFFERENT FUNCTIONAL MONOMERS.: ELECTROCHEMICAL PREPARATION OF A MOLECULAR IMPRINTED POLYMER ELECTRODE FOR ESTEMATION OF ASPIRIN USING TWO DIFFERENT FUNCTIONAL MONOMERS.
...Show More Authors

For aspirin estimated, a molecularly imprinted polymer MIP-ASP electrodes were generated by electro-polymerization process, the electrodes were prepared by combining the template (aspirin) with (vinyl acetate (VA), 1-vinylimidizole (VIZ) as a functional monomer and N, N-methylene bisacrylamide (MBAA) as crosslinkers using benzoyl peroxide (BPO) as an initiator. The efficiency of the membrane electrodes was analyzed by differential pulse voltammetry (DPV). Four electrodes were synthesized using two different plasticizers, di-butyl sebacate (DBS), di-octyl phthalate (DOP) in PVC matrix. Scanning electron microscopy (SEM) was used to describe the generated MIP, studying the electrodes properties, the slope, detection limit, and life

... Show More
View Publication Preview PDF
Publication Date
Tue Sep 10 2019
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
A classification model on tumor cancer disease based mutual information and firefly algorithm
...Show More Authors

View Publication
Scopus (15)
Crossref (6)
Scopus Crossref
Publication Date
Wed Sep 26 2018
Journal Name
Communications In Computer And Information Science
A New RGB Image Encryption Based on DNA Encoding and Multi-chaotic Maps
...Show More Authors

View Publication
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref