Preferred Language
Articles
/
fIYmqIYBIXToZYALgpxD
SIMULATION OF IDENTIFICATION AND CONTROL OF SCARA ROBOT USING MODIFIED RECURRENT NEURAL NETWORKS
...Show More Authors

This paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is better than RS and RW in identification the forward dynamics and provides good results in the Direct Inverse Neuro- Controller (DINC).

View Publication
Publication Date
Mon Feb 08 2016
Journal Name
Iraqi Journal Of Science,
Synthesis, Identification and Evaluation Biological Activity for Some New Triazole, Triazoline and Tetrazoline Derivatives From 2-Mercapto-3- phenyl-4(3H)Quinazolinone
...Show More Authors

This research, involved synthesis of some new 1,2,3-triazoline and 1,2,3,4- tetrazole derivatives from antharanilic acid as starting material .The first step includes formation of 2-Mercapto-3-phenyl-4(3H)Quinazolinone (0) through reacted of anthranilic acid with phenylisothiocyanate in ethanol, then compound (0) reaction with chloro acetyl chloride in dimethyl foramamide (DMF) to prepare intermediate S-(α-chloroaceto-2-yl)-3-phenylquinazolin-4(3H)-one (1); compound (1) reacted with sodium azide to yield S-(α-azidoaceto-2-yl)-3-phenylquinazolin-4(3H)-one (2), while Schiff bases (3-10) were prepared from condensation of substituted primary aromatic amines with different aromatic aldehydes in absolute ethanol as a solvent. Compound (2)

... Show More
Preview PDF
Publication Date
Sat Mar 30 2013
Journal Name
Australian Journal Of Basic And Applied Sciences
CFD Simulation of Heat Transfer Augmentation in Constant Heat-Fluxed Tube fitted with Baffled Twisted Tape Inserts
...Show More Authors

Publication Date
Sat Jun 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Ridge regression method with some classical methods to estimate the parameters of Lomax distribution by simulation
...Show More Authors

Abstract

In this research provide theoretical aspects of one of the most important statistical distributions which it is Lomax, which has many applications in several areas, set of estimation methods was used(MLE,LSE,GWPM) and compare with (RRE) estimation method ,in order to find out best estimation method set of simulation experiment (36) with many replications  in order  to get mean square error and used it to make compare , simulation experiment  contrast with (estimation method, sample size ,value of location and shape parameter) results show that estimation method effected by simulation experiment factors and ability of using other estimation methods such as(Shrinkage, jackknif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Oct 01 2024
Journal Name
Journal Of Engineering Science And Technology
NUMERICAL SIMULATION OF SHEET PILES AS A SEEPAGE CUTTER OFF: AL-KIFIL REGULATOR AS A CASE STUDY
...Show More Authors

Sheet piles are necessary with hydraulic structures as seepage cut-off to reduce the seepage. In this research, the computational work methodology was followed by building a numerical model using Geo-Studio program to check the efficiency of using concrete sheet piles as a cut-off or reducer for seepage with time if the sheet piles facing the drawdown technique. Al-Kifil regulator was chosen as a case study, an accurate model was built with a help of observed reading of the measuring devices, which was satisfactory and helped in checking the sheet piles efficiency. Through the study, three scenarios were adopted (with and without) drawdown technique, it was found that at the short time there's no effect of the drawdown technique on

... Show More
View Publication
Scopus
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Modified Symmetric Key Fully Homomorphic Encryption Scheme Based on Read-Muller Code
...Show More Authors

Homomorphic encryption became popular and powerful cryptographic primitive for various cloud computing applications. In the recent decades several developments has been made. Few schemes based on coding theory have been proposed but none of them support unlimited operations with security.   We propose a modified Reed-Muller Code based symmetric key fully homomorphic encryption to improve its security by using message expansion technique. Message expansion with prepended random fixed length string provides one-to-many mapping between message and codeword, thus one-to many mapping between plaintext and ciphertext. The proposed scheme supports both (MOD 2) additive and multiplication operations unlimitedly.   We make an effort to prove

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Jun 01 2020
Journal Name
Sensing And Bio-sensing Research
Hydrogen peroxide biosensor based on hemoglobin-modified gold nanoparticles–screen printed carbon electrode
...Show More Authors

View Publication
Scopus (38)
Crossref (30)
Scopus Clarivate Crossref
Publication Date
Fri Jul 21 2023
Journal Name
Journal Of Engineering
A Modified 2D-Checksum Error Detecting Method for Data Transmission in Noisy Media
...Show More Authors

In data transmission a change in single bit in the received data may lead to miss understanding or a disaster. Each bit in the sent information has high priority especially with information such as the address of the receiver. The importance of error detection with each single change is a key issue in data transmission field.
The ordinary single parity detection method can detect odd number of errors efficiently, but fails with even number of errors. Other detection methods such as two-dimensional and checksum showed better results and failed to cope with the increasing number of errors.
Two novel methods were suggested to detect the binary bit change errors when transmitting data in a noisy media.Those methods were: 2D-Checksum me

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Smart Flow Steering Agent for End-to-End Delay Improvement in Software-Defined Networks
...Show More Authors

To ensure fault tolerance and distributed management, distributed protocols are employed as one of the major architectural concepts underlying the Internet. However, inefficiency, instability and fragility could be potentially overcome with the help of the novel networking architecture called software-defined networking (SDN). The main property of this architecture is the separation of the control and data planes. To reduce congestion and thus improve latency and throughput, there must be homogeneous distribution of the traffic load over the different network paths. This paper presents a smart flow steering agent (SFSA) for data flow routing based on current network conditions. To enhance throughput and minimize latency, the SFSA distrib

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Mon Dec 14 2020
Journal Name
Baghdad Science Journal
Smart Flow Steering Agent for End-to-End Delay Improvement in Software-Defined Networks
...Show More Authors

View Publication
Crossref (2)
Crossref
Publication Date
Thu Oct 31 2019
Journal Name
Journal Of Theoretical And Applied Information Technology
AN ENHANCED EVOLUTIONARY ALGORITHM WITH LOCAL HEURISTIC APPROACH FOR DETECTING COMMUNITY IN COMPLEX NETWORKS
...Show More Authors

Preview PDF
Scopus (5)
Scopus