Preferred Language
Articles
/
joe-152
Application Artificial Forecasting Techniques in Cost Management (review)
...Show More Authors

For the duration of the last few many years many improvement in computer technology, software program programming and application production had been followed with the aid of diverse engineering disciplines. Those trends are on the whole focusing on synthetic intelligence strategies. Therefore, a number of definitions are supplied, which recognition at the concept of artificial intelligence from exclusive viewpoints. This paper shows current applications of artificial intelligence (AI) that facilitate cost management in civil engineering tasks. An evaluation of the artificial intelligence in its precise partial branches is supplied. These branches or strategies contributed to the creation of a sizable group of fashions such as difficulty evaluation, interpretation and prediction of various parameters. A list of decided on, updated fashions is provided, that challenge cost control for civil engineering initiatives. The models are analyzed in keeping with the pastime, discipline of operation, enter and output statistics and the techniques and strategies they implant. It will become clean that arterial   Intelligence may be the destiny vital tool for each engineer and it's going to lead to sizable upgrades within the construction area.

 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks
...Show More Authors

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Fri Aug 01 2008
Journal Name
2008 International Symposium On Information Technology
Generating pairwise combinatorial test set using artificial parameters and values
...Show More Authors

View Publication
Scopus (5)
Crossref (1)
Scopus Crossref
Publication Date
Sun Jan 14 2018
Journal Name
Journal Of Engineering
Second Order Sliding Mode Controller Design for Pneumatic Artificial Muscle
...Show More Authors

In this paper, first and second order sliding mode controllers are designed for a single link robotic arm actuated by two Pneumatic Artificial Muscles (PAMs). A new mathematical model for the arm has been developed based on the model of large scale pneumatic muscle actuator model. Uncertainty in parameters has been presented and tested for the two controllers. The simulation results of the second-order sliding mode controller proves to have a low tracking error and chattering effect as compared to the first order one. The verification has been done by using MATLAB and Simulink software.

 

View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
International Journal Of Engineering In Computer Science
Human biometric identification: Application and evaluation
...Show More Authors

View Publication
Crossref
Publication Date
Wed Apr 01 2015
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Security For Three -Tired Web Application
...Show More Authors

Web application protection lies on two levels: the first is the responsibility of the server management, and the second is the responsibility of the programmer of the site (this is the scope of the research). This research suggests developing a secure web application site based on three-tier architecture (client, server, and database). The security of this system described as follows: using multilevel access by authorization, which means allowing access to pages depending on authorized level; password encrypted using Message Digest Five (MD5) and salt. Secure Socket Layer (SSL) protocol authentication used. Writing PHP code according to set of rules to hide source code to ensure that it cannot be stolen, verification of input before it is s

... Show More
Preview PDF
Publication Date
Mon Nov 11 2019
Journal Name
Spe
Modeling Rate of Penetration using Artificial Intelligent System and Multiple Regression Analysis
...Show More Authors
Abstract<p>Over the years, the prediction of penetration rate (ROP) has played a key rule for drilling engineers due it is effect on the optimization of various parameters that related to substantial cost saving. Many researchers have continually worked to optimize penetration rate. A major issue with most published studies is that there is no simple model currently available to guarantee the ROP prediction.</p><p>The main objective of this study is to further improve ROP prediction using two predictive methods, multiple regression analysis (MRA) and artificial neural networks (ANNs). A field case in SE Iraq was conducted to predict the ROP from a large number of parame</p> ... Show More
View Publication Preview PDF
Crossref (7)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Brazilian Dental Science
Evaluation of flexural strength and degree of conversion of temporary crown materials at different aging periods in artificial saliva
...Show More Authors

Objective: Evaluate the effects of different storage periods on flexural strength (FS) and degree of conversion (DC) of Bis-Acryl composite and Urethane dimethacrylate provisional restorative materials. Material and Methods: A total of 60 specimens were prepared from four temporary crown materials commercially available and assigned to four tested groups (n = 15 for each group): Prevision Temp, B&E CROWN, Primma Art, and Charm Temp groups. The specimens were stored in artificial saliva, and the FS was tested after 24 h, 7 d, and 14 d. A standard three-point bending test was conducted using a universal testing machine. Additionally, the DC was determined using a Fourier transform infrared spectroscopy (FTIR) device. The data were analyzed st

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sun Mar 15 2020
Journal Name
Al-academy
Techniques of Acting Performance in Fantasy Theatrical Show: راسل كاظم عوده-ليلى فؤاد فاضل
...Show More Authors

     This research deals with the fact that arts exit from their familiar context in practice and enter in the context of the fantasy and exoticism picture. In order to understand the theatrical phenomenon and know the way of its production of the fantasy picture, especially the acting performance in its transitions between the real and fantasy. This study consists of: an introduction of the research in which the researcher presented the research problem, importance and objectives.  

    The theoretical framework dealt with founding a theoretical part for the research consisting of two sections: the first (fantasy: the concept and the working) and the second (techniques of acting perfo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 10 2018
Journal Name
Indian Journal Of Natural Sciences
Verification the Pollution of Tigris River in South of Baghdad using Remote Sensing Techniques
...Show More Authors

This paper describes the use of remote sensing techniques in verification of the polluted area in Diyala River and Tigris River and the effected of AL-Rustamiyah wastewater treatment plant, which is located on Diyala River, one of the branches of Tigris River in south of Baghdad. SPOT-5 a French satellite image of Baghdad, Iraq was used with ground resolution of 2.5 m in May 2016. ENVI 5.1 software programming was utilized for Image processing to assess the water pollution of Diyala and Tigris River’s water. Five regions were selected from a study area and then classified using the unsupervised ISODATA method. The results indicated that four classes of water quality which are successful in assessing and mapping water pollution which confi

... Show More
Publication Date
Sat Jan 01 2011
Journal Name
Journal Of Engineering
Simulation Model for the Assessment of Direct and Indirect Georeferencing Techniques in Analytical Photogrammetry
...Show More Authors

B Saleem, H Alwan, L Khalid, Journal of Engineering, 2011 - Cited by 2

View Publication