Preferred Language
Articles
/
c4aPR4YBIXToZYALXoHO
Expert system to predict effects of noise pollution on operators of power plant using neuro-fuzzy approach
...Show More Authors

Ration power plants, to generate power, have become common worldwide. One such one is the steam power plant. In such plants, various moving parts of heavy machines generate a lot of noise. Operators are subjected to high levels of noise. High noise level exposure leads to psychological as well physiological problems; different kinds of ill effects. It results in deteriorated work efficiency, although the exact nature of work performance is still unknown. To predict work efficiency deterioration, neuro-fuzzy tools are being used in research. It has been established that a neuro-fuzzy computing system helps in identification and analysis of fuzzy models. The last decade has seen substantial growth in development of various neuro-fuzzy systems. Among them, adaptive neuro-fuzzy inference system provides a systematic and directed approach for model building and gives the best possible design parameters in minimum possible time. This study aims to develop a neuro-fuzzy model to predict the effects of noise pollution on human work efficiency as a function of noise level, exposure time, and age of the operators doing complex type of task.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Steganography and Cryptography Techniques Based Secure Data Transferring Through Public Network Channel
...Show More Authors

Attacking a transferred data over a network is frequently happened millions time a day. To address this problem, a secure scheme is proposed which is securing a transferred data over a network. The proposed scheme uses two techniques to guarantee a secure transferring for a message. The message is encrypted as a first step, and then it is hided in a video cover.  The proposed encrypting technique is RC4 stream cipher algorithm in order to increase the message's confidentiality, as well as improving the least significant bit embedding algorithm (LSB) by adding an additional layer of security. The improvement of the LSB method comes by replacing the adopted sequential selection by a random selection manner of the frames and the pixels wit

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Dec 20 2021
Journal Name
Baghdad Science Journal
Generative Adversarial Network for Imitation Learning from Single Demonstration
...Show More Authors

Imitation learning is an effective method for training an autonomous agent to accomplish a task by imitating expert behaviors in their demonstrations. However, traditional imitation learning methods require a large number of expert demonstrations in order to learn a complex behavior. Such a disadvantage has limited the potential of imitation learning in complex tasks where the expert demonstrations are not sufficient. In order to address the problem, we propose a Generative Adversarial Network-based model which is designed to learn optimal policies using only a single demonstration. The proposed model is evaluated on two simulated tasks in comparison with other methods. The results show that our proposed model is capable of completing co

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Sat Jan 02 2021
Journal Name
Journal Of The College Of Languages (jcl)
The Broken Wings: The character of the Arab Christian |Woman in Sami Michael's Novel "Trumpet in the Wadi" versus "Jasmine" by Eli Amir: הכנפיים שנשברו דמות האישה הערבית הנוצרית ברומן " חוצוצרה בוואדי " של סמי מיכאל לעומת דמותה ב " יסמין " של אלי עמיר
...Show More Authors

Sami Michael and Eli Amir - two Israeli writers born in Iraq and of the same generation (Sami Makhail was born in Baghdad in 1926 and Eli Amir in 1937). They wrote in their novels, among other things, about Orientalism , love and femininity. They both lived wild, extroverted lives. They did not shy away from experiencing anything new that came their way, rebelled against conventions and acted provocatively; they enjoyed the shock and amazement that evoked around them. While trying to find their place in different family settings, they chose to present two Arab Christian heroines. The narrator in Jasmine is the speaker Noori-Eli himself. While the narrator of “Trumpet in the Wadi” is Huda the heroine herself. Both ar

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 17 2022
Journal Name
Journal Of The College Of Languages (jcl)
The Use of the Definite article in the Ottoman Turkish Language in the Fourteenth and Seventeenth Centuries: Qaboos Namah and Mazaki Collection as a Model: '' Kabusnâme ve Mezâkî Divanı Örneğinde ''14. ve 17. Yüzyılarda Osmanlı Türkçesinde Harf-i Ta'rifin Kullanması Üzerine Bir İnceleme
...Show More Authors

The Turks used the Ottoman Turkish language from the thirteenth century to the twentieth century.  During this period and under the influence of Islamic civilization, a large number of words and structures were used from the Arabic and Persian languages, Therefore, many Arabic grammatical structures were used in the Ottoman Turkish language, such as the definite article simply because it was widely used.

The paper is concerned with the use of the Arabic definite article in the Ottoman Turkish language, and the aim of this contrastive study is to find out the similarities and differences between the two languages ​​in terms of meaning and structure. Since linguistic studies depend on the practical side or applied approach, two

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Sep 15 2023
Journal Name
Al-academy
The recepient’s beauty in the algerian theatre and the recepient’s hypothetical bet , reading in stop theater by m’hammed ben gataf
...Show More Authors

Meditationsuggetsthat the theatrical world and the receiptindicatethattherie a thread connection or relationshipbetweenthembecausetheateris an art thatfailsinto the abyss of the humanfield ,receivingis a practice thatisreffered to by corners of society and islocated in the context of thisfield. Thus, the relationshipbetweenalgeriantheater and the recepientissanctified by the nature of theaterwhichisbased on a social basis thatbuildsitsexistance and continuityfrom the recepient.Its impossible to imagine a real theaterthatwillbeestablishedunlessit’sassociatedwith an audience so one hand never claps to makesound. This connectionis the first phenomenonthatcanbecome accessible to all people and itremains the second phenomenonthatrequires th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme
...Show More Authors

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Sat May 07 2016
Journal Name
International Journal Of Science And Research
Synthesis, Characterization and Antimicrobial Activity Studies of Mixed-1,10-phenanthroline- Mn(II),Co(II), Cu(II), Ni(II) and Hg(II) Complexes with Schiff Base[2,2'-(1Z,1'Z)-(biphenyl-4,4'- diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1- ylidene)diphenol]
...Show More Authors

Abstract: The M(II) complexes [M2(phen)2(L)(H2O)2Cl2] in (2:1:2 (M:L:phen) molar ratio, (where M(II) =Mn(II), Co(II), Cu(II), Ni(II) and Hg(II), phen = 1,10-phenanthroline; L = 2,2'-(1Z,1'Z)-(biphenyl-4,4'-diylbis(azan-1-yl-1-ylidene))bis(methan-1-yl-1- ylidene)diphenol] were synthesized. The mixed complexes have been prepared and characterized using 1H and13C NMR, UV/Visible, FTIR spectra methods and elemental microanalysis, as well as magnetic susceptibility and conductivity measurements. The metal complexes were tested in vitro against three types of pathogenic bacteria microorganisms: Staphylococcus aurous, Escherichia coli, Bacillussubtilis and Pseudomonasaeroginosa to assess their antimicrobial properties. From this study shows that a

... Show More
Preview PDF
Publication Date
Wed Feb 01 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc

... Show More
Scopus (10)
Scopus
Publication Date
Sat Sep 30 2017
Journal Name
Al-khwarizmi Engineering Journal
Travel Time Prediction Models and Reliability Indices for Palestine Urban Road in Baghdad City
...Show More Authors

Abstract

     Travel Time estimation and reliability measurement is an important issues for improving operation efficiency and safety of traffic roads networks. The aim of this research is the estimation of total travel time and distribution analysis for three selected links in Palestine Arterial Street in Baghdad city. Buffer time index results in worse reliability conditions. Link (2) from Bab Al Mutham intersection to Al-Sakara intersection produced a buffer index of about 36%  and 26 % for Link (1) Al-Mawall intersection to Bab Al- Mutham intersection and finally for link (3) which presented a 24% buffer index. These illustrated that the reliability get worst for link

... Show More
View Publication Preview PDF
Crossref (12)
Crossref
Publication Date
Sun Oct 23 2022
Journal Name
Baghdad Science Journal
Comparison Between Deterministic and Stochastic Model for Interaction (COVID-19) With Host Cells in Humans
...Show More Authors

In this paper, the deterministic and the stochastic models are proposed to study the interaction of the Coronavirus (COVID-19) with host cells inside the human body. In the deterministic model, the value of the basic reproduction number   determines the persistence or extinction of the COVID-19. If   , one infected cell will transmit the virus to less than one cell, as a result,  the person carrying the Coronavirus will get rid of the disease .If   the infected cell  will be able to infect  all  cells that contain ACE receptors. The stochastic model proves that if  are sufficiently large then maybe  give  us ultimate disease extinction although ,  and this  facts also proved by computer simulation.

View Publication Preview PDF
Scopus (9)
Crossref (6)
Scopus Clarivate Crossref