Preferred Language
Articles
/
joe-152
Application Artificial Forecasting Techniques in Cost Management (review)
...Show More Authors

For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions such as difficulty evaluation, interpretation and prediction of various parameters. A list of decided on, updated fashions is provided, that challenge cost control for civil engineering initiatives. The models are analyzed in keeping with the pastime, discipline of operation, enter and output statistics and the techniques and strategies they implant. It will become clean that arterial   Intelligence may be the destiny vital tool for each engineer and it's going to lead to sizable upgrades within the construction area.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri May 17 2013
Journal Name
Sensors
Evolution of Electroencephalogram Signal Analysis Techniques during Anesthesia
...Show More Authors

Biosignal analysis is one of the most important topics that researchers have tried to develop during the last century to understand numerous human diseases. Electroencephalograms (EEGs) are one of the techniques which provides an electrical representation of biosignals that reflect changes in the activity of the human brain. Monitoring the levels of anesthesia is a very important subject, which has been proposed to avoid both patient awareness caused by inadequate dosage of anesthetic drugs and excessive use of anesthesia during surgery. This article reviews the bases of these techniques and their development within the last decades and provides a synopsis of the relevant methodologies and algorithms that are used to analyze EEG sig

... Show More
View Publication
Scopus (55)
Crossref (57)
Scopus Clarivate Crossref
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref
Publication Date
Sat Apr 13 2019
Journal Name
Journal Of The College Of Languages (jcl)
Certains aspects techniques Chez Henri Barbusse dans L'ENFER
...Show More Authors

L’Enfer est un roman de chambre par excellence. Tous les événements s'y sont presque déroulés. Le sujet de ce roman se résume: un jeune homme quitte la campagne pour vivre à Paris .Il loue une chambre dans un hôtel. Il tombe, par un pur hasard, sur une fente dans le mur de sa par laquelle chambre il peut voir tout ce qui se passe dans la chambre voisine .L'histoire racontée par ce narrateur, est la vie intime des couples venant dans cette chambre. Il médite sur sa propre condition à la lumière de ce qui se déroule dans la chambre voisine .C'est pour cette raison,que le roman se caractérise par une stabilité.Quoi qu’elle soit manifeste, le héros démontre une mobilité à son niveau psychique. Car il y a une évolution

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 23 2017
Journal Name
International Conference Of Reliable Information And Communication Technology
Classification of Arabic Writer Based on Clustering Techniques
...Show More Authors

Arabic text categorization for pattern recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features are obtained from sectioned portions. Thirdly, F-Measure is used to evaluate the performance of the extracted features and their combination in different linkage methods for each distance measures and different numbers of groups. Finally, experiments are conducted on the standard KHATT dataset of Arabic handwritten text comprised of varying samples from 1000 writers. The results in the generatio

... Show More
Scopus (6)
Scopus
Publication Date
Mon Sep 20 2021
Journal Name
Research J. Pharm. And Tech.
The special techniques for Semen analysis and preparation
...Show More Authors

Infertility can be detected when the couples have not completed pregnancy after a year or more of normal coitus. So, in order to treat infertility, there are many supported reproductive techniques are in practice. The success rate of these techniques depends upon the way by which preparation of the paternal semen sample. Over the past 30 years, the manual has been standard as providing global standards and has been used extensively by research and clinical laboratories throughout the world. The spermatozoa of all placental (eutherian) mammals, including humans, are in a protective, no labile formal at ejaculation and are incapable of fertilization even if they are placed in direct contact with an oocyte. Accordingly, they must undergo a sub

... Show More
Scopus
Publication Date
Wed May 31 2023
Journal Name
Iraqi Geological Journal
A Survey of Infill Well Location Optimization Techniques
...Show More Authors

The maximization of the net present value of the investment in oil field improvements is greatly aided by the optimization of well location, which plays a significant role in the production of oil. However, using of optimization methods in well placement developments is exceedingly difficult since the well placement optimization scenario involves a large number of choice variables, objective functions, and restrictions. In addition, a wide variety of computational approaches, both traditional and unconventional, have been applied in order to maximize the efficiency of well installation operations. This research demonstrates how optimization approaches used in well placement have progressed since the last time they were examined. Fol

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Int. J. Nonlinear Anal. Appl.
Computer-based plagiarism detection techniques: A comparative study
...Show More Authors

Plagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and

... Show More
Publication Date
Tue Oct 12 2021
Journal Name
Engineering, Technology And Applied Science Research
Automated Pavement Distress Detection Using Image Processing Techniques
...Show More Authors

Pavement crack and pothole identification are important tasks in transportation maintenance and road safety. This study offers a novel technique for automatic asphalt pavement crack and pothole detection which is based on image processing. Different types of cracks (transverse, longitudinal, alligator-type, and potholes) can be identified with such techniques. The goal of this research is to evaluate road surface damage by extracting cracks and potholes, categorizing them from images and videos, and comparing the manual and the automated methods. The proposed method was tested on 50 images. The results obtained from image processing showed that the proposed method can detect cracks and potholes and identify their severity levels wit

... Show More
Scopus (27)
Crossref (23)
Scopus Crossref
Publication Date
Sun Mar 30 2025
Journal Name
Iraqi Journal Of Science
Segmentation of Aerial Images Using Different Clustering Techniques
...Show More Authors

The segmentation of aerial images using different clustering techniques offers valuable insights into interpreting and analyzing such images. By partitioning the images into meaningful regions, clustering techniques help identify and differentiate various objects and areas of interest, facilitating various applications, including urban planning, environmental monitoring, and disaster management. This paper aims to segment color aerial images to provide a means of organizing and understanding the visual information contained within the image for various applications and research purposes. It is also important to look into and compare the basic workings of three popular clustering algorithms: K-Medoids, Fuzzy C-Mean (FCM), and Gaussia

... Show More
View Publication
Crossref
Publication Date
Wed May 24 2023
Journal Name
2023 9th International Conference On Information Technology Trends (itt)
A Comparative Study of Unauthorized Drone Detection Techniques
...Show More Authors

View Publication
Crossref (2)
Crossref