Preferred Language
Articles
/
ijcpe-317
Optimal Design of Cylinderical Ectrode Using Neural Network Modeling for Electrochemical Finishing
...Show More Authors

The finishing operation of the electrochemical finishing technology (ECF) for tube of steel was investigated In this study. Experimental procedures included qualitative
and quantitative analyses for surface roughness and material removal. Qualitative analyses utilized finishing optimization of a specific specimen in various design and operating conditions; value of gap from 0.2 to 10mm, flow rate of electrolytes from 5 to 15liter/min, finishing time from 1 to 4min and the applied voltage from 6 to 12v, to find out the value of surface roughness and material removal at each electrochemical state. From the measured material removal for each process state was used to verify the relationship with finishing time of work piece. Electrochemical finishing proves an effective method to reduce the surface roughness (Ra) from 1.6μm to 0.1μm in 4 min. Finally, the observed relationships were used to predicate the diameter of blank, tool diameter and flow rate by neural network modeling ANN which has inputs defined by the finished hole diameter, surface roughness, and finishing time. Three of hidden layers and their neurons were found by an integration procedure. The design charts observed from this study utilize the designers in predication of diameter for blank and design of electrode.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Sat Oct 28 2023
Journal Name
Baghdad Science Journal
Improving Wireless Sensor Network Security Using Quantum Key Distribution
...Show More Authors

Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Civil And Environmental Engineering
Constructing a Corrected Stations Network Using Some Geomatic Techniques
...Show More Authors
Abstract<p>The major objective of this study is to establish a network of Ground Control Points-GCPs which can use it as a reference for any engineering project. Total Station (type: Nikon Nivo 5.C), Optical Level and Garmin Navigator GPS were used to perform traversing. Traversing measurement was achieved by using nine points covered the selected area irregularly. Near Civil Engineering Department at Baghdad University Al-jadiriya, an attempt has been made to assess the accuracy of GPS by comparing the data obtained from the Total Station. The average error of this method is 3.326 m with the highest coefficient of determination (R<sup>2</sup>) is 0.077 m observed in Northing. While in</p> ... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Journal Of Engineering
Prediction of Shear Strength Parameters of Gypseous Soil using Artificial Neural Networks
...Show More Authors

The shear strength of soil is one of the most important soil properties that should be identified before any foundation design. The presence of gypseous soil exacerbates foundation problems. In this research, an approach to forecasting shear strength parameters of gypseous soils based on basic soil properties was created using Artificial Neural Networks. Two models were built to forecast the cohesion and the angle of internal friction. Nine basic soil properties were used as inputs to both models for they were considered to have the most significant impact on soil shear strength, namely: depth, gypsum content, passing sieve no.200, liquid limit, plastic limit, plasticity index, water content, dry unit weight, and initial

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 30 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Fast Training Algorithms for Feed Forward Neural Networks
...Show More Authors

 The aim of this paper, is to discuss several high performance training algorithms fall into two main categories. The first category uses heuristic techniques, which were developed from an analysis of the performance of the standard gradient descent algorithm. The second category of fast algorithms uses standard numerical optimization techniques such as: quasi-Newton . Other aim is to solve the drawbacks related with these training algorithms and propose an efficient training algorithm for FFNN

View Publication Preview PDF
Publication Date
Sun Mar 30 2014
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Design of Horizontal Well Program for Ajeel Field
...Show More Authors

Horizontal wells are of great interest to the petroleum industry today because they provide an attractive means for improving both production rate and recovery efficiency. The great improvements in drilling technology make it possible to drill horizontal wells with complex trajectories and extended for significant depths.
The aim of this paper is to present the design aspects of horizontal well. Well design aspects include selection of bit and casing sizes, detection of setting depths and drilling fluid density, casing, hydraulics, well profile, and construction of drillstring simulator. An Iraqi oil field (Ajeel field) is selected for designing horizontal well to increase the productivity. Short radius horizontal well is suggested fo

... Show More
View Publication Preview PDF
Publication Date
Wed Feb 01 2017
Journal Name
Journal Of Multidisciplinary Engineering Science Studies
Investigation of p-Ps Produced by Electrochemical Etching
...Show More Authors

The nanocrystalline porous silicon (PS) films are prepared by electrochemical etching ECE of p -type silicon wafer with current density (10mA/cm ) and etching times on the formation nano -sized pore array with a dimension of around different etching time (10 and 20) min. The films were characterized by the measurement of XRD, atomic force microscopy properties (AFM). We have estimated crystallites size from X -Ray diffraction about nanoscale for PS and AFM confirms the nanometric size Chemical fictionalization during the electrochemical etching show on the surface chemical composition of PS. The atomic force microscopy investigation shows the rough silicon surface, with increasing etching process (current density and etching time) porous st

... Show More
Publication Date
Sun Mar 31 2024
Journal Name
Journal Of Optics
Novel characteristics of CQDs synthesized by electrochemical method
...Show More Authors

View Publication
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
A Proposed Agent System for Network Monitoring
...Show More Authors

The traditional centralized network management approach presents severe efficiency and scalability limitations in large scale networks. The process of data collection and analysis typically involves huge transfers of management data to the manager which cause considerable network throughput and bottlenecks at the manager side. All these problems processed using the Agent technology as a solution to distribute the management functionality over the network elements. The proposed system consists of the server agent that is working together with clients agents to monitor the logging (off, on) of the clients computers and which user is working on it. file system watcher mechanism is used to indicate any change in files. The results were presente

... Show More
View Publication Preview PDF
Crossref