Preferred Language
Articles
/
dxfWL48BVTCNdQwCh178
Design and manufacture an automatic knife for date palm tree frond cutting Operates by frequency theory Cutting‏
...Show More Authors

Publication Date
Mon Jan 01 2018
Journal Name
2018 Detroit, Michigan July 29 - August 1, 2018
Design and validation of an electronic data logging systems (CAN Bus) for monitoring machinery performance and management- Planting application
...Show More Authors

View Publication
Scopus (7)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Water Process Engineering
Removal kinetics of organic carbon from palm oil mill effluent by native duckweeds and its potential as a biofertilizer
...Show More Authors

View Publication
Scopus (11)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Mar 14 2019
Journal Name
Al-khwarizmi Engineering Journal
Sculptured Surface Design and Implementation by Lofting Design Method Using Cross-sectional B-Spline Curves
...Show More Authors

This research presents a particular designing strategy for a free form of surfaces, constructed by the lofting design method. The regarded surfaces were created by sliding a B-spline curves (profile curves), in addition to describing an automatic procedure for selective identification of sampling points in reverse engineering applications using Coordinate Measurement Machine. Two models have been implemented from (Ureol material) to represent the different cases of B-spline types to clarify its scope of application. The interior data of the desired surfaces was designed by MATLAB software, which then were transformed to UG-NX9 software for connecting the sections that were designed in MATLAB program and obtaining G-code programs for the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Aug 01 2021
Journal Name
Materials Today: Proceedings
A review of automatic history matching
...Show More Authors

View Publication
Scopus (6)
Crossref (3)
Scopus Crossref
Publication Date
Thu Sep 01 2022
Journal Name
Computers And Electrical Engineering
Automatic illness prediction system through speech
...Show More Authors

View Publication
Scopus (12)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Sun Oct 27 2024
Journal Name
Journal Of Economics And Administrative Sciences
An Integrated Approach to Constraints Theory and Fuzzy Analytical Hierarchy Process (FAHP) in Construction Projects (Case Study)
...Show More Authors

The research endeavors to harness the benefits stemming from the integration of constraint theory into construction project management, with the primary goal of mitigating project completion delays. Additionally, it employs fuzzy analysis to determine the relative significance of fundamental constraints within projects by assigning them appropriate weights. The research problem primarily revolves around two key issues. Firstly, the persistent utilization of outdated methodologies and a heavy reliance on workforce experience without embracing modern computerized technologies. Secondly, the recurring problem of project delivery delays. Construction projects typically encompass five fundamental constraint types: cost restrictions, tim

... Show More
Preview PDF
Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Iop Conference Series: Earth And Environmental Science
Combining Bourgoyne and Young Equations by Bagging Tree Regression to Predict Rate of Penetration in a Southern Iraqi Field, Case Study
...Show More Authors
Abstract<p>Achieving an accurate and optimal rate of penetration (ROP) is critical for a cost-effective and safe drilling operation. While different techniques have been used to achieve this goal, each approach has limitations, prompting researchers to seek solutions. This study’s objective is to conduct the strategy of combining the Bourgoyne and Young (BYM) ROP equations with Bagging Tree regression in a southern Iraqi field. Although BYM equations are commonly used and widespread to estimate drilling rates, they need more specific drilling parameters to capture different ROP complexities. The Bagging Tree algorithm, a random forest variant, addresses these limitations by blending domain kno</p> ... Show More
View Publication
Scopus Crossref
Publication Date
Wed Dec 01 2010
Journal Name
Al-khwarizmi Engineering Journal
An Optimum Design of Cam Mechanisms with Roller Follower for Combined Effect of Impact and High Contact Loads
...Show More Authors

     The problem in the design of a cam is the analyzing of the mechanisms and dynamic forces that effect on the family of parametric polynomials for describing the motion curve. In present method, two ways have been taken for optimization of the cam size, first the high dynamic loading (such that impact and elastic stress waves propagation) from marine machine tool which translate by the roller follower to the cam surface and varies with time causes large contact loads and second it must include the factors of kinematics features including the acceleration, velocity, boundary condition and the unsymmetrical curvature of the cam profile for the motion curve.

     In the theoretical solution

... Show More
View Publication Preview PDF