Preferred Language
Articles
/
dxchqJEBVTCNdQwCPJdY
Preparation and characterization of mawsonite Cu6Fe2SnS8 [CFTS] thin films via the semi-computerized spray pyrolysis technique for photovoltaic applications
...Show More Authors

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Jun 16 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Optimization algorithms for transportation problems with stochastic demand
...Show More Authors

The purpose of this paper is to solve the stochastic demand for the unbalanced transport problem using heuristic algorithms to obtain the optimum solution, by minimizing the costs of transporting the gasoline product for the Oil Products Distribution Company of the Iraqi Ministry of Oil. The most important conclusions that were reached are the results prove the possibility of solving the random transportation problem when the demand is uncertain by the stochastic programming model. The most obvious finding to emerge from this work is that the genetic algorithm was able to address the problems of unbalanced transport, And the possibility of applying the model approved by the oil products distribution company in the Iraqi Ministry of Oil to m

... Show More
View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Sat Nov 02 2019
Journal Name
Advances In Intelligent Systems And Computing
Spin-Image Descriptors for Text-Independent Speaker Recognition
...Show More Authors

Building a system to identify individuals through their speech recording can find its application in diverse areas, such as telephone shopping, voice mail and security control. However, building such systems is a tricky task because of the vast range of differences in the human voice. Thus, selecting strong features becomes very crucial for the recognition system. Therefore, a speaker recognition system based on new spin-image descriptors (SISR) is proposed in this paper. In the proposed system, circular windows (spins) are extracted from the frequency domain of the spectrogram image of the sound, and then a run length matrix is built for each spin, to work as a base for feature extraction tasks. Five different descriptors are generated fro

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Physics: Conference Series
Disc damage likelihood scale recognition for Glaucoma detection
...Show More Authors
Abstract<p>Glaucoma is a visual disorder, which is one of the significant driving reason for visual impairment. Glaucoma leads to frustrate the visual information transmission to the brain. Dissimilar to other eye illness such as myopia and cataracts. The impact of glaucoma can’t be cured; The Disc Damage Likelihood Scale (DDLS) can be used to assess the Glaucoma. The proposed methodology suggested simple method to extract Neuroretinal rim (NRM) region then dividing the region into four sectors after that calculate the width for each sector and select the minimum value to use it in DDLS factor. The feature was fed to the SVM classification algorithm, the DDLS successfully classified Glaucoma d</p> ... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Forward-Reverse Osmosis Processes for Oily Wastewater Treatment
...Show More Authors

In this study, the feasibility of Forward–Reverse osmosis processes was investigated for treating the oily wastewater. The first stage was applied forward osmosis process to recover pure water from oily wastewater. Sodium chloride (NaCl) and magnesium chloride (MgCl2) salts were used as draw solutions and the membrane that was used in forward osmosis (FO) process was cellulose triacetate (CTA) membrane. The operating parameters studied were: draw solution concentrations (0.25 – 0.75 M), oil concentration in feed solution (FS) (100-1000 ppm), the temperature of FS and draw solution (DS) (30 - 45 °C), pH of FS (4-10) and the flow rate of both DS and FS (20 - 60 l/h). It was found that the water flux and oil concentration in FS increas

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue May 16 2023
Journal Name
Journal Of Engineering
System Identification Algorithm for Systems with Interval Coefficients
...Show More Authors

In this research a new system identification algorithm is presented for obtaining an optimal set of mathematical models for system with perturbed coefficients, then this algorithm is applied practically by an “On Line System Identification Circuit”, based on real time speed response data of a permanent magnet DC motor. Such set of mathematical models represents the physical plant against all variation which may exist in its parameters, and forms a strong mathematical foundation for stability and performance analysis in control theory problems.

View Publication Preview PDF
Crossref
Publication Date
Sun Dec 04 2011
Journal Name
Baghdad Science Journal
Rotation Effect in Morse Potential For K2 Molecule
...Show More Authors

The rotation effect upon Morse potential had been studied and the values of the effective potential in potential curves had been calculated for electronic states (X2?+g , B ?u ) K2 molecule. The calculation had been computed for rotational quantum number (J = 5). Also, drawing potential curves for these systems had been done using Herzberg and Gaydon equations. It was found that the values of the dissociation energy which resulting from using Herzberg equation greater than that of Gaydon equation. Besides, it was found that the rotation effect for (X and B) electronic states in Morse potential is very small and in this case may negligible.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposal for Exchange Text message Based on Image
...Show More Authors

     The messages are ancient method to exchange information between peoples. It had many ways to send it with some security.

    Encryption and steganography was oldest ways to message security, but there are still many problems in key generation, key distribution, suitable cover image and others. In this paper we present proposed algorithm to exchange security message without any encryption, or image as cover to hidden. Our proposed algorithm depends on two copies of the same collection images set (CIS), one in sender side and other in receiver side which always exchange message between them.

      To send any message text the sender converts message to ASCII c

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fast Training Algorithms for Feed Forward Neural Networks
...Show More Authors

 The aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN

View Publication Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Iraqi Journal Of Science
Review on Hybrid Swarm Algorithms for Feature Selection
...Show More Authors

    Feature selection represents one of the critical processes in machine learning (ML). The fundamental aim of the problem of feature selection is to maintain performance accuracy while reducing the dimension of feature selection. Different approaches were created for classifying the datasets. In a range of optimization problems, swarming techniques produced better outcomes. At the same time, hybrid algorithms have gotten a lot of attention recently when it comes to solving optimization problems. As a result, this study provides a thorough assessment of the literature on feature selection problems using hybrid swarm algorithms that have been developed over time (2018-2021). Lastly, when compared with current feature selection procedu

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Weighted k-Nearest Neighbour for Image Spam Classification
...Show More Authors

E-mail is an efficient and reliable data exchange service. Spams are undesired e-mail messages which are randomly sent in bulk usually for commercial aims. Obfuscated image spamming is one of the new tricks to bypass text-based and Optical Character Recognition (OCR)-based spam filters. Image spam detection based on image visual features has the advantage of efficiency in terms of reducing the computational cost and improving the performance. In this paper, an image spam detection schema is presented. Suitable image processing techniques were used to capture the image features that can differentiate spam images from non-spam ones. Weighted k-nearest neighbor, which is a simple, yet powerful, machine learning algorithm, was used as a clas

... Show More
View Publication Preview PDF
Scopus (3)
Crossref (3)
Scopus Crossref