Preferred Language
Articles
/
ijs-4685
Cloud-based Voice Home automation System Based on Internet of Things

    The rapid development of automation industries and technologies has shown incredible prospects for transforming our homes into a smart home automation system, which are more secure than a simple home. This paper proposes a home application based on voice and text called the Automated Control and Monitoring System (ASCM). This application can be utilized by both normal and vision-impaired people by using with a mobile phone.

The application allows users to send voice commands through Google Assistant installed on Android to control the appliances. They can also have complete monitoring by logging onto the ThingSpeak dashboard, which displays a device status indicator and sends alert messages in the event of danger. The NodeMCU development board based on the ESP8266 and a combination of sensors, modules and actuators were used to create a "control system" for home appliances based on the Internet of Things (IoT). This work mitigates the challenges that faced the design of smart homes based on (IoT).  The control and monitoring system is using voice without the need to use programming languages. As well as the automation process is not only on / off but also querying the status of any device sensors. In addition, this application dispenses with IFTTT(If-This-Then-that) services to send alert messages because their number is limited during the month, compared to the alerts provided by the Blynk app, which is unlimited. Mobile phones and robotic homes will make life easier and more enjoyable for the elderly and differently abled people who are unable to manually turn the items ON/OFF.

Scopus Crossref
View Publication
Publication Date
Wed Mar 24 2021
Journal Name
Ieee Access
Smart IoT Network Based Convolutional Recurrent Neural Network With Element-Wise Prediction System

An Intelligent Internet of Things network based on an Artificial Intelligent System, can substantially control and reduce the congestion effects in the network. In this paper, an artificial intelligent system is proposed for eliminating the congestion effects in traffic load in an Intelligent Internet of Things network based on a deep learning Convolutional Recurrent Neural Network with a modified Element-wise Attention Gate. The invisible layer of the modified Element-wise Attention Gate structure has self-feedback to increase its long short-term memory. The artificial intelligent system is implemented for next step ahead traffic estimation and clustering the network. In the proposed architecture, each sensing node is adaptive and able to

... Show More
Scopus (9)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Tue Jul 24 2018
Journal Name
Sensors
Adaptive Windowing Framework for Surface Electromyogram-Based Pattern Recognition System for Transradial Amputees

Electromyogram (EMG)-based Pattern Recognition (PR) systems for upper-limb prosthesis control provide promising ways to enable an intuitive control of the prostheses with multiple degrees of freedom and fast reaction times. However, the lack of robustness of the PR systems may limit their usability. In this paper, a novel adaptive time windowing framework is proposed to enhance the performance of the PR systems by focusing on their windowing and classification steps. The proposed framework estimates the output probabilities of each class and outputs a movement only if a decision with a probability above a certain threshold is achieved. Otherwise (i.e., all probability values are below the threshold), the window size of the EMG signa

... Show More
Crossref (24)
Clarivate Crossref
View Publication
Publication Date
Mon Mar 01 2021
Journal Name
Al-khwarizmi Engineering Journal
Building a High Accuracy Transfer Learning-Based Quality Inspection System at Low Costs

      Products’ quality inspection is an important stage in every production route, in which the quality of the produced goods is estimated and compared with the desired specifications. With traditional inspection, the process rely on manual methods that generates various costs and large time consumption. On the contrary, today’s inspection systems that use modern techniques like computer vision, are more accurate and efficient. However, the amount of work needed to build a computer vision system based on classic techniques is relatively large, due to the issue of manually selecting and extracting features from digital images, which also produces labor costs for the system engineers.

  &nbsp

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jun 01 2014
Journal Name
Baghdad Science Journal
Classification of fetal abnormalities based on CTG signal

The fetal heart rate (FHR) signal processing based on Artificial Neural Networks (ANN),Fuzzy Logic (FL) and frequency domain Discrete Wavelet Transform(DWT) were analysis in order to perform automatic analysis using personal computers. Cardiotocography (CTG) is a primary biophysical method of fetal monitoring. The assessment of the printed CTG traces was based on the visual analysis of patterns that describing the variability of fetal heart rate signal. Fetal heart rate data of pregnant women with pregnancy between 38 and 40 weeks of gestation were studied. The first stage in the system was to convert the cardiotocograghy (CTG) tracing in to digital series so that the system can be analyzed ,while the second stage ,the FHR time series was t

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Apr 23 2017
Journal Name
International Conference Of Reliable Information And Communication Technology
Classification of Arabic Writer Based on Clustering Techniques

Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio

... Show More
Scopus (5)
Scopus
Publication Date
Thu May 28 2020
Journal Name
Iraqi Journal Of Science
Human Action Recognition Based on Bag-of-Words

Human action recognition has gained popularity because of its wide applicability, such as in patient monitoring systems, surveillance systems, and a wide diversity of systems that contain interactions between people and electrical devices, including human computer interfaces. The proposed method includes sequential stages of object segmentation, feature extraction, action detection and then action recognition. Effective results of human actions using different features of unconstrained videos was a challenging task due to camera motion, cluttered background, occlusions, complexity of human movements, and variety of same actions performed by distinct subjects. Thus, the proposed method overcomes such problems by using the fusion of featur

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Advanced Research In Dynamical And Control Systems
Scopus
Publication Date
Sun Apr 01 2018
Journal Name
Journal Of Engineering And Applied Sciences
New Data Security Method Based on Biometrics

Merging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering

... Show More
Publication Date
Fri Nov 11 2022
Journal Name
Al-mansour Journal
Text Cryptography Based on Three Different Keys

Secure information transmission over the internet is becoming an important requirement in data communication. These days, authenticity, secrecy, and confidentiality are the most important concerns in securing data communication. For that reason, information hiding methods are used, such as Cryptography, Steganography and Watermarking methods, to secure data transmission, where cryptography method is used to encrypt the information in an unreadable form. At the same time, steganography covers the information within images, audio or video. Finally, watermarking is used to protect information from intruders. This paper proposed a new cryptography method by using thre

... Show More
Publication Date
Wed Nov 20 2024
Journal Name
Iraqi Journal Of Science
View Publication