Preferred Language
Articles
/
kRecQo8BVTCNdQwC7Wfg
Classification of al-hammar marshes satellite images in Iraq using artificial neural network based on coding representation
...Show More Authors

Scopus
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network
...Show More Authors

Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one prot

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 24 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Iris Data Compression Based on Hexa-Data Coding
...Show More Authors

Iris research is focused on developing techniques for identifying and locating relevant biometric features, accurate segmentation and efficient computation while lending themselves to compression methods. Most iris segmentation methods are based on complex modelling of traits and characteristics which, in turn, reduce the effectiveness of the system being used as a real time system. This paper introduces a novel parameterized technique for iris segmentation. The method is based on a number of steps starting from converting grayscale eye image to a bit plane representation, selection of the most significant bit planes followed by a parameterization of the iris location resulting in an accurate segmentation of the iris from the origin

... Show More
View Publication
Crossref
Publication Date
Wed Sep 01 2021
Journal Name
Journal Of Engineering
Spike neural network as a controller in SDN network
...Show More Authors

The paper proposes a methodology for predicting packet flow at the data plane in smart SDN based on the intelligent controller of spike neural networks(SNN). This methodology is applied to predict the subsequent step of the packet flow, consequently reducing the overcrowding that might happen. The centralized controller acts as a reactive controller for managing the clustering head process in the Software Defined Network data layer in the proposed model. The simulation results show the capability of Spike Neural Network controller in SDN control layer to improve the (QoS) in the whole network in terms of minimizing the packet loss ratio and increased the buffer utilization ratio.

View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Proceedings Of International Conference On Computing And Communication Networks
Speech Age Estimation Using a Ranking Convolutional Neural Network
...Show More Authors

View Publication
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Engineering
A Realistic Aggregate Load Representation for A Distribution Substation in Baghdad Network
...Show More Authors

Electrical distribution system loads are permanently not fixed and alter in value and nature with time. Therefore, accurate consumer load data and models are required for performing system planning, system operation, and analysis studies. Moreover, realistic consumer load data are vital for load management, services, and billing purposes. In this work, a realistic aggregate electric load model is developed and proposed for a sample operative substation in Baghdad distribution network. The model involves aggregation of hundreds of thousands of individual components devices such as motors, appliances, and lighting fixtures. Sana’a substation in Al-kadhimiya area supplies mainly residential grade loads. Measurement-based

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 07 2020
Journal Name
Environmental Science And Pollution Research
The biosorption of reactive red dye onto orange peel waste: a study on the isotherm and kinetic processes and sensitivity analysis using the artificial neural network approach
...Show More Authors

View Publication
Scopus (30)
Crossref (26)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (14)
Crossref (5)
Scopus Crossref
Publication Date
Tue Sep 19 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Density and Approximation by Using Feed Forward Artificial Neural Networks
...Show More Authors

I n  this  paper ,we 'viii  consider  the density  questions  associC;lted with  the single  hidden layer feed forward  model. We proved  that a FFNN   with   one   hidden   layer  can   uniformly   approximate   any continuous  function  in C(k)(where k is a compact set in R11 ) to any required accuracy.

 

However, if the set of basis function is dense then the ANN's can has al most one hidden layer. But if the set of basis function  non-dense, then we  need more  hidden layers. Also, we have shown  that there exist  localized functions and that there is no t

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Engineering Science And Technology
Evaluating water quality index of al Hammar Marsh, south of Iraq with the application of GIS technique
...Show More Authors

Scopus (18)
Scopus