Preferred Language
Articles
/
cRfQNY8BVTCNdQwCtmIm
VSM Based Models and Integration of Exact and Fuzzy Similarity For Improving Detection of External Textual Plagiarism admin June 29, 2019
...Show More Authors

Clarivate Crossref
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Journal Of Engineering
Self-Repairing Technique Based on Microcapsules for Cementitious Composites- A Review
...Show More Authors

Self-repairing technology based on micro-capsules is an efficient solution for repairing cracked cementitious composites. Self-repairing based on microcapsules begins with the occurrence of cracks and develops by releasing self-repairing factors in the cracks located in concrete. Based on previous comprehensive studies, this paper provides an overview of various repairing factors and investigative methodologies. There has recently been a lack of consensus on the most efficient criteria for assessing self-repairing based on microcapsules and the smart solutions for improving capsule survival ratios during mixing. The most commonly utilized self-repairing efficiency assessment indicators are mechanical resistance and durab

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Mar 01 2010
Journal Name
Al-khwarizmi Engineering Journal
Bionics-Based Approach for Object Tracking to Implement in Robot Applications
...Show More Authors

In this paper, an approach for object tracking that is inspired from human oculomotor system is proposed and verified experimentally. The developed approach divided into two phases, fast tracking or saccadic phase and smooth pursuit phase. In the first phase, the field of the view is segmented into four regions that are analogue to retinal periphery in the oculomotor system. When the object of interest is entering these regions, the developed vision system responds by changing the values of the pan and tilt angles to allow the object lies in the fovea area and then the second phase will activate. A fuzzy logic method is implemented in the saccadic phase as an intelligent decision maker to select the values of the pan and tilt angle based

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 15 2019
Journal Name
Iet Microwaves, Antennas & Propagation
Hilbert metamaterial printed antenna based on organic substrates for energy harvesting
...Show More Authors

Abstract In this study, an investigation is conducted to realise the possibility of organic materials use in radio frequency (RF) electronics for RF-energy harvesting. Iraqi palm tree remnants mixed with nickel oxide nanoparticles hosted in polyethylene, INP substrates, is proposed for this study. Moreover, a metamaterial (MTM) antenna is printed on the created INP substrate of 0.8 mm thickness using silver nanoparticles conductive ink. The fabricated antenna performances are instigated numerically than validated experimentally in terms of S11 spectra and radiation patterns. It is found that the proposed antenna shows an ultra-wide band matching bandwidth to cover the frequencies from 2.4 to 10 GHz with bore-sight gain variation from 2.2 to

... Show More
View Publication
Scopus (50)
Crossref (31)
Scopus Clarivate Crossref
Publication Date
Tue Jan 01 2019
Journal Name
International Journal Of Advanced Computer Science And Applications
Achieving Flatness: Honeywords Generation Method for Passwords based on user behaviours
...Show More Authors

View Publication
Crossref (3)
Crossref
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Back stepping-Based-PID-Controller Designed for an Artificial Pancreas model
...Show More Authors

Artificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose

 

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
Perceptually Important Points-Based Data Aggregation Method for Wireless Sensor Networks
...Show More Authors

The transmitting and receiving of data consume the most resources in Wireless Sensor Networks (WSNs). The energy supplied by the battery is the most important resource impacting WSN's lifespan in the sensor node. Therefore, because sensor nodes run from their limited battery, energy-saving is necessary. Data aggregation can be defined as a procedure applied for the elimination of redundant transmissions, and it provides fused information to the base stations, which in turn improves the energy effectiveness and increases the lifespan of energy-constrained WSNs. In this paper, a Perceptually Important Points Based Data Aggregation (PIP-DA) method for Wireless Sensor Networks is suggested to reduce redundant data before sending them to the

... Show More
View Publication Preview PDF
Scopus (54)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Indoor/Outdoor Deep Learning Based Image Classification for Object Recognition Applications
...Show More Authors

With the rapid development of smart devices, people's lives have become easier, especially for visually disabled or special-needs people. The new achievements in the fields of machine learning and deep learning let people identify and recognise the surrounding environment. In this study, the efficiency and high performance of deep learning architecture are used to build an image classification system in both indoor and outdoor environments. The proposed methodology starts with collecting two datasets (indoor and outdoor) from different separate datasets. In the second step, the collected dataset is split into training, validation, and test sets. The pre-trained GoogleNet and MobileNet-V2 models are trained using the indoor and outdoor se

... Show More
View Publication Preview PDF
Scopus (4)
Scopus Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Computers, Materials & Continua
Severity Based Light-Weight Encryption Model for Secure Medical Information System
...Show More Authors

View Publication
Scopus (18)
Crossref (33)
Scopus Clarivate Crossref
Publication Date
Wed Dec 14 2016
Journal Name
Journal Of Baghdad College Of Dentistry
Detection of Granulocyte Chemotactic Protein 2 in Serum of Periodontitis Patients
...Show More Authors

Background: Chronic periodontitis defined as “an infectious inflammatory disease within supporting tissues of the teeth, progressive attachment loss and bone loss". Aggressive periodontitis is rare which in most cases manifest themselves clinically during youth. It characterized by rapid rate of disease progression .Pro-inflammatory chemokines organized inflammatory responses. Granulocyte chemotactic protein 2 is involved in neutrophil gathering and movement. The purpose of the study is to detect serum of Granulocyte Chemotactic Protein 2 and correlate to periodontal condition in patients with chronic periodontitis, Aggressive periodontitis and Healthy Control subjects and measurement the count of neutrophils for the studied groups. S

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Tue May 23 2023
Journal Name
Journal Of Engineering
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mech

... Show More
View Publication Preview PDF
Crossref