Preferred Language
Articles
/
bsj-9087
An improved neurogenetic model for recognition of 3D kinetic data of human extracted from the Vicon Robot system
...Show More Authors

These days, it is crucial to discern between different types of human behavior, and artificial intelligence techniques play a big part in that.  The characteristics of the feedforward artificial neural network (FANN) algorithm and the genetic algorithm have been combined to create an important working mechanism that aids in this field. The proposed system can be used for essential tasks in life, such as analysis, automation, control, recognition, and other tasks. Crossover and mutation are the two primary mechanisms used by the genetic algorithm in the proposed system to replace the back propagation process in ANN. While the feedforward artificial neural network technique is focused on input processing, this should be based on the process of breaking the feedforward artificial neural network algorithm. Additionally, the result is computed from each ANN during the breaking up process, which is based on the breaking up of the artificial neural network algorithm into multiple ANNs based on the number of ANN layers, and therefore, each layer in the original artificial neural network algorithm is assessed. The best layers are chosen for the crossover phase after the breakage process, while the other layers go through the mutation process. The output of this generation is then determined by combining the artificial neural networks into a single ANN; the outcome is then checked to see if the process needs to create a new generation. The system performed well and produced accurate findings when it was used with data taken from the Vicon Robot system, which was primarily designed to record human behaviors based on three coordinates and classify them as either normal or aggressive.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 02 2015
Journal Name
International Journal Of Engineering Research And General Science
IT Auditing to Assure a Secure Cloud Computing for Enterprise Applications
...Show More Authors

Recently, all over the world mechanism of cloud computing is widely acceptable and used by most of the enterprise businesses in order increase their productivity. However there are still some concerns about the security provided by the cloud environment are raises. Thus in this our research project, we are discussing over the cloud computing paradigm evolvement for the large business applications like CRM as well as introducing the new framework for the secure cloud computing using the method of IT auditing. In this case our approach is basically directed towards the establishment of the cloud computing framework for the CRM applications with the use of checklists by following the data flow of the CRM application and its lifecycle. Those ch

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Applied Soft Computing
A new evolutionary multi-objective community mining algorithm for signed networks
...Show More Authors

View Publication
Scopus (8)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Fri Dec 01 2023
Journal Name
Iraqi Journal Of Physics
Fatigue and Tensile Characteristics for Composite Materials Used in Prosthetic Socket
...Show More Authors

In this research, the use of natural materials like wool and cannabis as intermediate reinforcement for prosthetic limbs due to their comfort, affordability, and local availability was discussed. As part of this study on below-the-knee (BK) prosthetic sockets, two sets of samples were made using a vacuum method. These sets were made of natural fiber-reinforced polymer composites with lamination 80:20: group (Y) had 4 perlon, 1 wool 4 perlon, and group (G) had 4 perlon, 1 cannabis 4 perlon. The two groups were compared with a socket made of polypropylene. Tensile testing was used to determine the mechanical characteristics of the socket materials. The Y group has a yield stress of 17 MPs, an ultimate strength of 18.75 MPa, and an elastic

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2019
Journal Name
Iop Conference Series: Materials Science And Engineering
Chlorine concentration-time (C-T) plot for Echhornia Crassipes in water
...Show More Authors
Abstract<p>Eichhornia, or water hyacinth represents a serious threat to potable water basins. This problem is materialized majorly in consuming large amounts of water and dissolved Oxygen that is necessary for aquatic life, and minorly in hindering water streams. Even there are limited trials to overcome such pests, none of them presents an acceptable solution economically and logically. Chlorine is a well-known biocide and broadly used in water industry. It could give a possible method to fight such weed. To investigate that, concentration-time plot should be introduced similar to any other microorganisms; especially, bacteria in water. In this work, various doses of Chlorine along various time</p> ... Show More
View Publication
Scopus (4)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Nov 30 2018
Journal Name
Iop Conference Series: Materials Science And Engineering
Damage pattern scope prediction for well point dewatering on building foundations
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Analytical Presentation for Constant Terminal Pressure Functions (Reservoir Oil-Well Systems)
...Show More Authors

View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Advances In Informatics And Computing In Civil And Construction Engineering: Proceedings Of The 35th Cib W78 2018 Conference: It In Design, Construction, And Management
Technology alternatives for workplace safety risk mitigation in construction: Exploratory study
...Show More Authors

Publication Date
Sun Mar 03 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
Using Information Technology for Comprehensive Analysis and Prediction in Forensic Evidence
...Show More Authors

With the escalation of cybercriminal activities, the demand for forensic investigations into these crimeshas grown significantly. However, the concept of systematic pre-preparation for potential forensicexaminations during the software design phase, known as forensic readiness, has only recently gainedattention. Against the backdrop of surging urban crime rates, this study aims to conduct a rigorous andprecise analysis and forecast of crime rates in Los Angeles, employing advanced Artificial Intelligence(AI) technologies. This research amalgamates diverse datasets encompassing crime history, varioussocio-economic indicators, and geographical locations to attain a comprehensive understanding of howcrimes manifest within the city. Lev

... Show More
View Publication
Scopus (21)
Crossref (11)
Scopus Crossref
Publication Date
Sat Oct 30 2021
Journal Name
Iraqi Journal Of Science
Small Binary Codebook Design for Image Compression Depending on Rotating Blocks
...Show More Authors

     The searching process using a binary codebook of combined Block Truncation Coding (BTC) method and Vector Quantization (VQ), i.e. a full codebook search for each input image vector to find the best matched code word in the codebook, requires a long time.   Therefore, in this paper, after designing a small binary codebook, we adopted a new method by rotating each binary code word in this codebook into 900 to 2700 step 900 directions. Then, we systematized each code word depending on its angle  to involve four types of binary code books (i.e. Pour when , Flat when  , Vertical when, or Zigzag). The proposed scheme was used for decreasing the time of the coding procedure, with very small distortion per block, by designing s

... Show More
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Physics: Conference Series
A Multilevel Approach for Stability Conditions in Fractional Time Diffusion Problems
...Show More Authors
Abstract<p>The Caputo definition of fractional derivatives introduces solution to the difficulties appears in the numerical treatment of differential equations due its consistency in differentiating constant functions. In the same time the memory and hereditary behaviors of the time fractional order derivatives (TFODE) still common in all definitions of fractional derivatives. The use of properties of companion matrices appears in reformulating multilevel schemes as generalized two level schemes is employed with the Gerschgorin disc theorems to prove stability condition. Caputo fractional derivatives with finite difference representations is considered. Moreover the effect of using the inverse operator which tr</p> ... Show More
View Publication
Scopus Crossref