Preferred Language
Articles
/
ijcpe-391
Prediction of bubble size in Bubble columns using Artificial Neural Network
...Show More Authors

In the literature, several correlations have been proposed for bubble size prediction in bubble columns. However these correlations fail to predict bubble diameter over a wide range of conditions. Based on a data bank of around 230 measurements collected from the open literature, a correlation for bubble sizes in the homogenous region in bubble columns was derived using Artificial Neural Network (ANN) modeling. The bubble diameter was found to be a function of six parameters: gas velocity, column diameter, diameter of orifice, liquid density, liquid viscosity and liquid surface tension. Statistical analysis showed that the proposed correlation has an Average Absolute Relative Error (AARE) of 7.3 % and correlation coefficient of 92.2%. A comparison with selected correlations in the literature showed that the developed ANN correlation noticeably improved the prediction of bubble sizes. The developed correlation also shows better prediction over a wide range of operation parameters in bubble columns.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Early Diagnose Alzheimer's Disease by Convolution Neural Network-based Histogram Features Extracting and Canny Edge
...Show More Authors

Alzheimer's disease (AD) increasingly affects the elderly and is a major killer of those 65 and over. Different deep-learning methods are used for automatic diagnosis, yet they have some limitations. Deep Learning is one of the modern methods that were used to detect and classify a medical image because of the ability of deep Learning to extract the features of images automatically. However, there are still limitations to using deep learning to accurately classify medical images because extracting the fine edges of medical images is sometimes considered difficult, and some distortion in the images. Therefore, this research aims to develop A Computer-Aided Brain Diagnosis (CABD) system that can tell if a brain scan exhibits indications of

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Itm Web Of Conferences
Embedded Neural Network like PID Water Heating Controller Implementing Cycle by Cycle Power Control Scheme
...Show More Authors

This paper experimentally investigates the heating process of a hot water supply using a neural network implementation of a self-tuning PID controller on a microcontroller system. The Particle Swarm Optimization (PSO) algorithm employed in system tuning proved very effective, as it is simple and fast optimization algorithm. The PSO method for the PID parameters is executed on the Matlab platform in order to put these parameters in the real-time digital PID controller, which was experimented with in a pilot study on a microcontroller platform. Instead of the traditional phase angle power control (PAPC) method, the Cycle by Cycle Power Control (CBCPC) method is implemented because it yields better power factor and eliminates harmonics

... Show More
View Publication
Crossref
Publication Date
Mon Jun 17 2019
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Dynamic Channel Assignment Using Neural Networks
...Show More Authors

This paper presents a proposed neural network algorithm to solve the shortest path problem (SPP) for communication routing. The solution extends the traditional recurrent Hopfield architecture introducing the optimal routing for any request by choosing single and multi link path node-to-node traffic to minimize the loss. This suggested neural network algorithm implemented by using 20-nodes network example. The result shows that a clear convergence can be achieved by 95% valid convergence (about 361 optimal routes from 380-pairs). Additionally computation performance is also mentioned at the expense of slightly worse results.

View Publication Preview PDF
Publication Date
Sat Dec 02 2017
Journal Name
Al-khwarizmi Engineering Journal
Direction Finding Using GHA Neural Networks
...Show More Authors

 This paper adapted the neural network for the estimating of the direction of arrival (DOA). It uses an unsupervised adaptive neural network with GHA algorithm to extract the principal components that in turn, are used by Capon method to estimate the DOA, where by the PCA neural network we take signal subspace only and use it in Capon (i.e. we will ignore the noise subspace, and take the signal subspace only).

 

 

View Publication Preview PDF
Publication Date
Thu Jun 01 2023
Journal Name
Ifip Advances In Information And Communication Technology
Rapid Thrombogenesis Prediction in Covid-19 Patients Using Machine Learning
...Show More Authors

Machine Learning (ML) algorithms are increasingly being utilized in the medical field to manage and diagnose diseases, leading to improved patient treatment and disease management. Several recent studies have found that Covid-19 patients have a higher incidence of blood clots, and understanding the pathological pathways that lead to blood clot formation (thrombogenesis) is critical. Current methods of reporting thrombogenesis-related fluid dynamic metrics for patient-specific anatomies are based on computational fluid dynamics (CFD) analysis, which can take weeks to months for a single patient. In this paper, we propose a ML-based method for rapid thrombogenesis prediction in the carotid artery of Covid-19 patients. Our proposed system aims

... Show More
View Publication
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Fri Jan 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using the Size Strain Plot Method to Specity Lattice Parameters
...Show More Authors

X-ray diffractometers deliver the best quality diffraction data while being easy to use and adaptable to various applications. When X-ray photons strike electrons in materials, the incident photons scatter in a direction different from the incident beam; if the scattered beams do not change in wavelength, this is known as elastic scattering, which causes amplitude and intensity diffraction, leading to constructive interference. When the incident beam gives some of its energy to the electrons, the scattered beam's wavelength differs from the incident beam's wavelength, causing inelastic scattering, which leads to destructive interference and zero-intensity diffraction. In this study, The modified size-strain plot method was used to examin

... Show More
View Publication Preview PDF
Crossref (6)
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 30 2008
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Characteristic Performance of Deionized Columns
...Show More Authors

The reclamation of makeup water is studied in terms of breakthrough time (i.e., the leakage of the cations). Makeup water was subjected to lab-scale ion exchangers of two types: strong acid cation and weak base anion exchanger. The experimental investigation was directed to study the ion exchanger performance in terms of four different parameters (i.e., copper concentration, total dissolved solids (TDS), feed rate and bed depth). Box-Wilson composite rotatable design was adopted in designing the experiments. Breakthrough times of the effluent stream are measured in terms of copper concentration of 2 to 25 ppm, TDS concentration of 250 to 1250 ppm, feed rate of 0.38 to 5.34 l/h and bed depth of 5 to 70 cm. Simulation the effect of the stu

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref