Preferred Language
Articles
/
fIYmqIYBIXToZYALgpxD
SIMULATION OF IDENTIFICATION AND CONTROL OF SCARA ROBOT USING MODIFIED RECURRENT NEURAL NETWORKS
...Show More Authors

This paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is better than RS and RW in identification the forward dynamics and provides good results in the Direct Inverse Neuro- Controller (DINC).

View Publication
Publication Date
Wed Feb 01 2023
Journal Name
Baghdad Science Journal
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
...Show More Authors

A content-based image retrieval (CBIR) is a technique used to retrieve images from an image database. However, the CBIR process suffers from less accuracy to retrieve images from an extensive image database and ensure the privacy of images. This paper aims to address the issues of accuracy utilizing deep learning techniques as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon, Kim, Kim, and Song (CKKS). To achieve these aims, a system has been proposed, namely RCNN_CKKS, that includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri Aug 02 2024
Journal Name
Quantum Studies: Mathematics And Foundations
Implementation of a modified noise-free and noisy multistage quantum cryptography protocol using QISKIT
...Show More Authors

Classical cryptography systems exhibit major vulnerabilities because of the rapid development of quan tum computing algorithms and devices. These vulnerabilities were mitigated utilizing quantum key distribution (QKD), which is based on a quantum no-cloning algorithm that assures the safe generation and transmission of the encryption keys. A quantum computing platform, named Qiskit, was utilized by many recent researchers to analyze the security of several QKD protocols, such as BB84 and B92. In this paper, we demonstrate the simulation and implementation of a modified multistage QKD protocol by Qiskit. The simulation and implementation studies were based on the “local_qasm” simulator and the “FakeVigo” backend, respectively. T

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Medical Image Segmentation using Modified Interactive Thresholding Technique
...Show More Authors

Medical image segmentation is one of the most actively studied fields in the past few decades, as the development of modern imaging modalities such as magnetic resonance imaging (MRI) and computed tomography (CT), physicians and technicians nowadays have to process the increasing number and size of medical images. Therefore, efficient and accurate computational segmentation algorithms become necessary to extract the desired information from these large data sets. Moreover, sophisticated segmentation algorithms can help the physicians delineate better the anatomical structures presented in the input images, enhance the accuracy of medical diagnosis and facilitate the best treatment planning. Many of the proposed algorithms could perform w

... Show More
View Publication Preview PDF
Publication Date
Fri Aug 05 2016
Journal Name
International Journal Of Advances In Scientific Research And Engineering
Image Encryption Using Modified AES with Bio-Chaotic
...Show More Authors

Due to the vast using of digital images and the fast evolution in computer science and especially the using of images in the social network.This lead to focus on securing these images and protect it against attackers, many techniques are proposed to achieve this goal. In this paper we proposed a new chaotic method to enhance AES (Advanced Encryption Standards) by eliminating Mix-Columns transformation to reduce time consuming and using palmprint biometric and Lorenz chaotic system to enhance authentication and security of the image, by using chaotic system that adds more sensitivity to the encryption system and authentication for the system.

View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Iraqi Journal Of Science
PLAGIARISM DETECTION SYSTEM IN SCIENTIFIC PUBLICATION USING LSTM NETWORKS
...Show More Authors

Scopus (3)
Scopus
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network
...Show More Authors

Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 30 2022
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Comparison of Estimation Sonic Shear Wave Time Using Empirical Correlations and Artificial Neural Network
...Show More Authors

Wellbore instability and sand production onset modeling are very affected by Sonic Shear Wave Time (SSW). In any field, SSW is not available for all wells due to the high cost of measuring. Many authors developed empirical correlations using information from selected worldwide fields for SSW prediction. Recently, researchers have used different Artificial Intelligence methods for estimating SSW. Three existing empirical correlations of Carroll, Freund, and Brocher are used to estimate SSW in this paper, while a fourth new empirical correlation is established. For comparing with the empirical correlation results, another study's Artificial Neural Network (ANN) was used. The same data t

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Rawaa Emad Jaloud And Fadia Falahfadia Falah
Isolation and Identification of Fungal Propagation in Iraqi Meat and Detection of Aflatoxin B1 Using ELISA Technique
...Show More Authors

Scopus (5)
Scopus
Publication Date
Sun Sep 06 2009
Journal Name
Baghdad Science Journal
Estimation of Immunoglobulins and complements and Using Enzyme linked Immuno sorbant Assay in Identification of Vulvovaginal candidiasis
...Show More Authors

This study was conducted to determine the Immuno – globulins and complements quantitatively. The result revealed that the concentration of Immunoglobulin M(IgM) was increased significantly in patient group comparing with control group . The concentration of complement protein C4 was increased significantly in patient group comparing with control group.IgG of Candida albicans was detected by using ELISA Technique, the result indicated also that this antibody was found in 628% of the women who infected with Vulvovaginal Candidiasis. The sensitivity and specificity of the test were 63% and 89% respectively.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Feb 09 2019
Journal Name
Journal Of The College Of Education For Women
Key Exchange Management by using Neural Network Synchronization
...Show More Authors

The paper presents a neural synchronization into intensive study in order to address challenges preventing from adopting it as an alternative key exchange algorithm. The results obtained from the implementation of neural synchronization with this proposed system address two challenges: namely the verification of establishing the synchronization between the two neural networks, and the public initiation of the input vector for each party. Solutions are presented and mathematical model is developed and presented, and as this proposed system focuses on stream cipher; a system of LFSRs (linear feedback shift registers) has been used with a balanced memory to generate the key. The initializations of these LFSRs are neural weights after achiev

... Show More
View Publication Preview PDF