Preferred Language
Articles
/
ehe6WY8BVTCNdQwCN23Y
Facial deepfake performance evaluation based on three detection tools: MTCNN, Dlib, and MediaPipe
...Show More Authors

Scopus Crossref
View Publication
Publication Date
Mon Nov 01 2021
Journal Name
Journal Of Engineering
Performance Evaluation of Pole Placement and Linear Quadratic Regulator Strategies Designed for Mass-Spring-Damper System Based on Simulated Annealing and Ant Colony Optimization
...Show More Authors

This paper investigates the performance evaluation of two state feedback controllers, Pole Placement (PP) and Linear Quadratic Regulator (LQR). The two controllers are designed for a Mass-Spring-Damper (MSD) system found in numerous applications to stabilize the MSD system performance and minimize the position tracking error of the system output. The state space model of the MSD system is first developed. Then, two meta-heuristic optimizations, Simulated Annealing (SA) optimization and Ant Colony (AC) optimization are utilized to optimize feedback gains matrix K of the PP and the weighting matrices Q and R of the LQR to make the MSD system reach stabilization and reduce the oscillation of the response. The Matlab softwar

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Sat Jan 01 2022
Journal Name
Food Science And Technology
Study on herbicide residues in soybean processing based on UPLC-MS/MS detection
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Feb 09 2023
Journal Name
Artificial Intelligence Review
Community detection model for dynamic networks based on hidden Markov model and evolutionary algorithm
...Show More Authors

Finding communities of connected individuals in complex networks is challenging, yet crucial for understanding different real-world societies and their interactions. Recently attention has turned to discover the dynamics of such communities. However, detecting accurate community structures that evolve over time adds additional challenges. Almost all the state-of-the-art algorithms are designed based on seemingly the same principle while treating the problem as a coupled optimization model to simultaneously identify community structures and their evolution over time. Unlike all these studies, the current work aims to individually consider this three measures, i.e. intra-community score, inter-community score, and evolution of community over

... Show More
View Publication
Scopus (5)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
International Journal Of Renewable Energy Research
Performance of Wind Turbines at Three Sites in Iraq
...Show More Authors

Matching between wind site characteristics and wind turbine characteristics for three selected sites in Iraq was carried out. Site-turbine matching for potential wind power application in Iraq has not yet been well reported on. Thus, in this study, five years’ wind speed data for sites located in Baghdad (33.34N, 44.40E), Nasiriyah (31.05N, 46.25E), and Basrah (30.50N, 47.78E) were collected. A full wind energy analysis based on the measured data, Weibull distribution function, and wind turbine characteristics was made. A code developed using MATLAB software was used to analyse the wind energy and wind turbines models. The primary objective was to achieve a standard wind turbine-site matching based on the capacity factor. Another matching

... Show More
View Publication
Crossref (1)
Crossref
Publication Date
Sat Feb 25 2017
Journal Name
International Journal On Advanced Science, Engineering And Information Technology
A Novel DNA Sequence Approach for Network Intrusion Detection System Based on Cryptography Encoding Method
...Show More Authors

A novel method for Network Intrusion Detection System (NIDS) has been proposed, based on the concept of how DNA sequence detects disease as both domains have similar conceptual method of detection. Three important steps have been proposed to apply DNA sequence for NIDS: convert the network traffic data into a form of DNA sequence using Cryptography encoding method; discover patterns of Short Tandem Repeats (STR) sequence for each network traffic attack using Teiresias algorithm; and conduct classification process depends upon STR sequence based on Horspool algorithm. 10% KDD Cup 1999 data set is used for training phase. Correct KDD Cup 1999 data set is used for testing phase to evaluate the proposed method. The current experiment results sh

... Show More
View Publication
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Kuwait Journal Of Science
Detection of the most frequent sources of dust storms in Iraq during 2020–2023 using space tools
...Show More Authors

Dust storms are typical in arid and semi-arid regions such as the Middle East; the frequency and severity of dust storms have grown dramatically in Iraq in recent years. This paper identifies the dust storm sources in Iraq using remotely sensed data from Meteosat-spinning enhanced visible and infrared imager (SEVIRI) bands. Extracted combined satellite images and simulated frontal dust storm trajectories, using the Hybrid Single Particle Lagrangian Integrated Trajectory (HYSPLIT) model, are used to identify the most influential sources in the Middle East and Iraq. Out of 132 dust storms in Iraq during 2020–2023, the most frequent occurred in the spring and summer. A dust source frequency percentage map (DSFPM) is generated using ArcGIS so

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Sep 12 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Network Performance Analysis Based on Network Simulator NS-2.
...Show More Authors

     NS-2 is a tool to simulate networks and events that occur per packet sequentially based on time and are widely used in the research field. NS-2 comes with NAM (Network Animator) that produces a visual representation it also supports several simulation protocols. The network can be tested end-to-end. This test includes data transmission, delay, jitter, packet-loss ratio and throughput. The Performance Analysis simulates a virtual network and tests for transport layer protocols at the same time with variable data and analyzes simulation results based on the network simulator NS-2.

View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Al-farabi For Engineering Sciences Vol
Prototyping of Multi-Factors Based Vehicle Accident Detection and Reporting System Relying on GPS and GSM
...Show More Authors

Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Performance Evaluation Strategy and its Impact on the Achievement of Organizational Effectiveness
...Show More Authors

Abstract

The research aims to determine the impact of the strategy performance evaluation and of the Standards (leadership, people, knowledge, processes, financial) in the achievement of organizational effectiveness in accordance with the dimensions (planning and setting goals, Exploitation of the Environment, achieve the goals, the ability to adapt, information management and communications) and the relationship between them, the problem of the research in the growing interest in the process of performance evaluation for organizations, the erroneous belief that the performance evaluation activity is useful, and the fact that performance evaluation process is one of the main tasks of the work of the Office of the Inspecto

... Show More
View Publication Preview PDF
Crossref