Preferred Language
Articles
/
hoYLt4YBIXToZYALuLP9
Experimental study on curved composite I-girder bridge subjected to Iraqi live loading for road bridges
...Show More Authors

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
A Haptic feedback system based on leap motion controller for prosthetic hand application
...Show More Authors

Leap Motion Controller (LMC) is a gesture sensor consists of three infrared light emitters and two infrared stereo cameras as tracking sensors. LMC translates hand movements into graphical data that are used in a variety of applications such as virtual/augmented reality and object movements control. In this work, we intend to control the movements of a prosthetic hand via (LMC) in which fingers are flexed or extended in response to hand movements. This will be carried out by passing in the data from the Leap Motion to a processing unit that processes the raw data by an open-source package (Processing i3) in order to control five servo motors using a micro-controller board. In addition, haptic setup is proposed using force sensors (F

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Sun Sep 01 2019
Journal Name
Al-khwarizmi Engineering Journal
Effect of Shot Peening on Fatigue Properties for Corroded and Uncorroded (CK35) Steel
...Show More Authors

The traction property is one of the important mechanical properties, especially the rotary parts which are subjected to constant and variable loads There are many methods used to improve this property, and the shoot peening by metal balls is considered the most critical one. the study focuses on this characteristic of steel CK35 used in many engineering applications as the rotating shafts and railway This study shows that the fatigue strength is improved by14% after shoot peening with metal balls. The study includs the rehabilitation of damaged samples as a result of fatigue corrosion. The standard solution adopted was 36% MgCl­2 with a 30 days immersion period. These samples has been improved by 6% after it decreased by18% d

... Show More
View Publication Preview PDF
Publication Date
Wed May 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
On Double Stage Shrinkage-Bayesian Estimator for the Scale Parameter of Exponential Distribution
...Show More Authors

  This paper is concerned with Double Stage Shrinkage Bayesian (DSSB) Estimator for lowering the mean squared error of classical estimator ˆ q for the scale parameter (q) of an exponential distribution in a region (R) around available prior knowledge (q0) about the actual value (q) as initial estimate as well as to reduce the cost of experimentations.         In situation where the experimentations are time consuming or very costly, a Double Stage procedure can be used to reduce the expected sample size needed to obtain the estimator. This estimator is shown to have smaller mean squared error for certain choice of the shrinkage weight factor y( ) and for acceptance region R. Expression for

... Show More
View Publication Preview PDF
Publication Date
Wed Dec 30 2020
Journal Name
Iraqi Journal Of Science
DNA Encoding for Misuse Intrusion Detection System based on UNSW-NB15 Data Set
...Show More Authors

Recent researches showed that DNA encoding and pattern matching can be used for the intrusion-detection system (IDS), with results of high rate of attack detection. The evaluation of these intrusion detection systems is based on datasets that are generated decades ago. However, numerous studies outlined that these datasets neither inclusively reflect the network traffic, nor the modern low footprint attacks, and do not cover the current network threat environment. In this paper, a new DNA encoding for misuse IDS based on UNSW-NB15 dataset is proposed. The proposed system is performed by building a DNA encoding for all values of 49 attributes. Then attack keys (based on attack signatures) are extracted and, finally, Raita algorithm is app

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Wed May 29 2019
Journal Name
Iraqi Journal Of Physics
Weathering effects on the thermal conductivity of PS/PMMA blends for packaging application
...Show More Authors

This work describes the weathering effects (UV-Irradiation, and Rain) on the thermal conductivity of PS, PMMA, PS/PMMA blend for packaging application. The samples were prepared by cast method at different ratios (10, 30, 50, 70, and 90 %wt). It was seen that the thermal conductivity of PMMA (0.145 W/m.K), and for PS(0.095 W/m.K), which increases by PS ratio increase up to 50% PS/PMMA blend then decreased that was attributed to increase in miscibility of the blend involved. By UV-weathering, it was seen that thermal conductivity for PMMA increased with UV-weathering up to (30hr) then decreased, that was attributed to rigidity and defect formation, respectively. For 30%PS/PMMA, there results showed unsystematic decrease in thermal conduct

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Survival estimation for singly type one censored sample based on generalized Rayleigh distribution
...Show More Authors

This paper interest to estimation the unknown parameters for generalized Rayleigh distribution model based on censored samples of singly type one . In this paper the probability density function for generalized Rayleigh is defined with its properties . The maximum likelihood estimator method is used to derive the point estimation for all unknown parameters based on iterative method , as Newton – Raphson method , then derive confidence interval estimation which based on Fisher information matrix . Finally , testing whether the current model ( GRD ) fits to a set of real data , then compute the survival function and hazard function for this real data.

View Publication Preview PDF
Crossref
Publication Date
Wed Oct 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Affect of Financial Development on Poverty in Iraq for the Period 1980-2010
...Show More Authors

There are many applied Economic studies that have found positive nexus between financial development and poverty reduction in developing countries. Iraq has witnessed an increasing rate of poverty during the period 1980-2010 due to many internal and external factors such as wars, economic sanctions, inflation, a high rate of unemployment, and political and security instability. Therefore, the investigation about the solutions to reduce poverty becomes very necessary, and enhancing the financial development in Iraq is one of these options. This is due to that the financial development could reduce the poverty rates through two channels: the first is direct via the offering of the loans and other financial facilities to the poor, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
Generating a Strong Key for a Stream Cipher Systems Based on Permutation Networks
...Show More Authors

The choice of binary Pseudonoise (PN) sequences with specific properties, having long period high complexity, randomness, minimum cross and auto- correlation which are essential for some communication systems. In this research a nonlinear PN generator is introduced . It consists of a combination of basic components like Linear Feedback Shift Register (LFSR), ?-element which is a type of RxR crossbar switches. The period and complexity of a sequence which are generated by the proposed generator are computed and the randomness properties of these sequences are measured by well-known randomness tests.

View Publication Preview PDF
Crossref
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2019
Journal Name
Journal Of Engineering
Design of New Hybrid Neural Controller for Nonlinear CSTR System based on Identification
...Show More Authors

This paper proposes improving the structure of the neural controller based on the identification model for nonlinear systems. The goal of this work is to employ the structure of the Modified Elman Neural Network (MENN) model into the NARMA-L2 structure instead of Multi-Layer Perceptron (MLP) model in order to construct a new hybrid neural structure that can be used as an identifier model and a nonlinear controller for the SISO linear or nonlinear systems. Two learning algorithms are used to adjust the parameters weight of the hybrid neural structure with its serial-parallel configuration; the first one is supervised learning algorithm based Back Propagation Algorithm (BPA) and the second one is an intelligent algorithm n

... Show More
View Publication Preview PDF
Crossref (2)
Crossref