Preferred Language
Articles
/
lxfrS5IBVTCNdQwCzqrd
Simulation and Implementation of SNR Measurement processor for Adaptive Communication Systems
...Show More Authors

Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 01 2022
Journal Name
Telkomnika (telecommunication Computing Electronics And Control)
An adaptive neural control methodology design for dynamics mobile robot
...Show More Authors

View Publication
Scopus (9)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Journal Of Engineering
Adaptive Sliding Mode Controller for Servo Actuator System with Friction
...Show More Authors

This paper addresses the use of adaptive sliding mode control for the servo actuator system with friction. The adaptive sliding mode control has several advantages over traditional sliding mode control method. Firstly, the magnitude of control effort is reduced to the minimal admissible level defined by the conditions for the sliding mode to exist. Secondly, the upper bounds of uncertainties are not required to be known in advance. Therefore, adaptive sliding mode control method can be effectively implemented. The numerical simulation via MATLAB 2014a for servo actuator system with friction is investigated to confirm the effectiveness of the proposed robust adaptive sliding mode control scheme. The results clarify, after

... Show More
View Publication Preview PDF
Publication Date
Tue Nov 01 2016
Journal Name
Iosr Journal Of Computer Engineering
Implementation of new Secure Mechanism for Data Deduplication in Hybrid Cloud
...Show More Authors

Cloud computing provides huge amount of area for storage of the data, but with an increase of number of users and size of their data, cloud storage environment faces earnest problem such as saving storage space, managing this large data, security and privacy of data. To save space in cloud storage one of the important methods is data deduplication, it is one of the compression technique that allows only one copy of the data to be saved and eliminate the extra copies. To offer security and privacy of the sensitive data while supporting the deduplication, In this work attacks that exploit the hybrid cloud deduplication have been identified, allowing an attacker to gain access to the files of other users based on very small hash signatures of

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2011
Journal Name
Journal Of Engineering
IMPLEMENTATION OF GYPSEOUS SOIL-ASPHALT STABILIZATION TECHNIQUE FOR BASE COURSE CONSTRUCTION
...Show More Authors

The aim of this research work is to study the effect of stabilizing gypseous soil, which covers
vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties
to be used as a base course layer replacing the traditional materials of coarse aggregate and broken
stones which are scarce at economical prices and hauling distances.
Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%,
medium curing cutback asphalt (MC-30), and hydrated lime are used in this study.
The conducted tests on untreated and treated gypseous soil with different percentages of medium
curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and o

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Wed Nov 02 2011
Journal Name
Journal Of Engineering
Implementation of Gypseous Soil-asphalt Stabilization Technique for Base Course Construction
...Show More Authors

The aim of this research work is to study the effect of stabilizing gypseous soil, which covers vast areas in the middle, west and south parts of Iraq, using liquid asphalt on its strength properties to be used as a base course layer replacing the traditional materials of coarse aggregate and broken stones which are scarce at economical prices and hauling distances. Gypseous soil brought from Al-Ramadi City, west of Iraq, with gypsum content of 66.65%, medium curing cutback asphalt (MC-30), and hydrated lime are used in this study. The conducted tests on untreated and treated gypseous soil with different percentages of medium curing cutback asphalt (MC-30), water, and lime were: unconfined compression strength, and one dimensional confine

... Show More
Publication Date
Tue Jun 01 2021
Journal Name
Iop Conference Series: Earth And Environmental Science
Implementation of hierarchically porous zeolite-polymer membrane for Chromium ions removal
...Show More Authors
Abstract<p>This work deals with the preparation of a zeolite/polymer flat sheet membrane with hierarchical porosity and ion-exchange properties. The performance of the prepared membrane was examined by the removal of chromium ions from simulated wastewater. A NaY zeolite (crystal size of 745.8 nm) was prepared by conventional hydrothermal treatment and fabricated with polyethersulfone (15% PES) in dimethylformamide (DMF) to obtain an ion-exchange ultrafiltration membrane. The permeate flux was enhanced by increasing the zeolite content within the membrane texture indicating increasing the hydrophilicity of the prepared membranes and constructing a hierarchically porous system. A membrane contain</p> ... Show More
View Publication
Scopus (28)
Crossref (17)
Scopus Crossref
Publication Date
Thu Dec 28 2023
Journal Name
Journal Européen Des Systèmes Automatisés
Design of a Hybrid Adaptive Controller for Series Elastic Actuators of Robots
...Show More Authors

View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Wed Jul 01 2020
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Fast and robust approach for data security in communication channel using pascal matrix
...Show More Authors

This paper present the fast and robust approach of English text encryption and decryption based on Pascal matrix. The technique of encryption the Arabic or English text or both and show the result when apply this method on plain text (original message) and how will form the intelligible plain text to be unintelligible plain text in order to secure information from unauthorized access and from steel information, an encryption scheme usually uses a pseudo-random enecryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption are done by using MATLAB as programming language and notepad ++to write the input text.This paper present the fast and robust approach of English text encryption and decryption b

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref
Publication Date
Thu Jun 20 2024
Journal Name
Ingénierie Des Systèmes D Information
Enabling Technologies for Ultra-Low Latency and High-Reliability Communication in 6G Networks
...Show More Authors

View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Aip Conference Proceedings
Quality measurement for openstreetmap buildings outlines in Baghdad/Iraq
...Show More Authors

OpenStreetMap (OSM) is the world’s biggest publicly licensed geographic data collection. Because OSM is rapidly being used in a wide range of applications, researchers have focused their efforts on determining its quality. The OSM buildings data quality is still ambiguous, due to the limitations, and a few researchers have evaluated the OSM buildings data quality through difficulties where the authoritative data are not obtainable. The focus of this research is to analyze and assess the accuracy of OSM buildings including completeness, and positional accuracy methods. Two different study areas in Baghdad city-Iraq have been investigated: Al-Rasheed and Al-Karrada. The process of the (OSM) data evaluation involved identifying the correspon

... Show More
View Publication
Scopus Crossref