Preferred Language
Articles
/
shf2L48BVTCNdQwCGV4T
AN ENHANCED EVOLUTIONARY ALGORITHM WITH LOCAL HEURISTIC APPROACH FOR DETECTING COMMUNITY IN COMPLEX NETWORKS

Scopus
Preview PDF
Quick Preview PDF
Publication Date
Thu May 28 2020
Journal Name
Applied Sciences
THz-TDS for Detecting Glycol Contamination in Engine Oil

There continues to be a need for an in-situ sensor system to monitor the engine oil of internal combustion engines. Engine oil needs to be monitored for contaminants and depletion of additives. While various sensor systems have been designed and evaluated, there is still a need to develop and evaluate new sensing technologies. This study evaluated Terahertz time-domain spectroscopy (THz-TDS) for the identification and estimation of the glycol contamination of automotive engine oil. Glycol contamination is a result of a gasket or seal leak allowing coolant to enter an engine and mix with the engine oil. An engine oil intended for use in both diesel and gasoline engines was obtained. Fresh engine oil samples were contaminated with fou

... Show More
Scopus (10)
Crossref (12)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Dec 26 2018
Journal Name
Iraqi Journal Of Science
New Improved Heuristic Method for Solving Travelling Salesman Problem

In this paper we will investigate some Heuristic methods to solve travelling salesman problem. The discussed methods are Minimizing Distance Method (MDM), Branch and Bound Method (BABM), Tree Type Heuristic Method (TTHM) and Greedy Method (GRM).

The weak points of MDM are manipulated in this paper. The Improved MDM (IMDM) gives better results than classical MDM, and other discussed methods, while the GRM gives best time for 5≤ n ≤500, where n is the number of visited cities.

View Publication Preview PDF
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Engineering
A Cognition Path Planning with a Nonlinear Controller Design for Wheeled Mobile Robot Based on an Intelligent Algorithm

This paper presents a cognition path planning with control algorithm design for a nonholonomic wheeled mobile robot based on Particle Swarm Optimization (PSO) algorithm. The aim of this work is to propose the circular roadmap (CRM) method to plan and generate optimal path with free navigation as well as to propose a nonlinear MIMO-PID-MENN controller in order to track the wheeled mobile robot on the reference path. The PSO is used to find an online tune the control parameters of the proposed controller to get the best torques actions for the wheeled mobile robot. The numerical simulation results based on the Matlab package show that the proposed structure has a precise and highly accurate distance of the generated refere

... Show More
Crossref (2)
Crossref
View Publication Preview PDF
Publication Date
Mon Oct 31 2022
Journal Name
International Journal Of Intelligent Engineering And Systems
Scopus (8)
Crossref (2)
Scopus Crossref
Publication Date
Sun Feb 27 2022
Journal Name
Iraqi Journal Of Science
An Improved Meerkat Clan Algorithm for Solving 0-1 Knapsack Problem

     Meerkat Clan Algorithm (MCA) is a nature-based metaheuristic algorithm which imitates the intelligent behavior of the meerkat animal. This paper presents an improvement on the MCA based on a chaotic map and crossover strategy (MCA-CC). These two strategies increase the diversification and intensification of the proposed algorithm and boost the searching ability to find more quality solutions. The 0-1 knapsack problem was solved by the basic MCA and the improved version of this algorithm (MCA-CC). The performance of these algorithms was tested on low and high dimensional problems. The experimental results demonstrate that the proposed algorithm had overcome the basic algorithm in terms of solution quality, speed a

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Mar 18 2022
Journal Name
Aro-the Scientific Journal Of Koya University
Detecting Deepfakes with Deep Learning and Gabor Filters

The proliferation of many editing programs based on artificial intelligence techniques has contributed to the emergence of deepfake technology. Deepfakes are committed to fabricating and falsifying facts by making a person do actions or say words that he never did or said. So that developing an algorithm for deepfakes detection is very important to discriminate real from fake media. Convolutional neural networks (CNNs) are among the most complex classifiers, but choosing the nature of the data fed to these networks is extremely important. For this reason, we capture fine texture details of input data frames using 16 Gabor filters indifferent directions and then feed them to a binary CNN classifier instead of using the red-green-blue

... Show More
Crossref (1)
Clarivate Crossref
View Publication
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
Scopus (16)
Crossref (15)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Oct 15 2019
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Combining Convolutional Neural Networks and Slantlet Transform For An Effective Image Retrieval Scheme

In the latest years there has been a profound evolution in computer science and technology, which incorporated several fields. Under this evolution, Content Base Image Retrieval (CBIR) is among the image processing field. There are several image retrieval methods that can easily extract feature as a result of the image retrieval methods’ progresses. To the researchers, finding resourceful image retrieval devices has therefore become an extensive area of concern. Image retrieval technique refers to a system used to search and retrieve images from digital images’ huge database. In this paper, the author focuses on recommendation of a fresh method for retrieving image. For multi presentation of image in Convolutional Neural Network (CNN),

... Show More
Scopus (10)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
Silver Nanoflowers as an Interfacial Liquid-State Surface Enhanced Raman Spectroscopy (SERS) Sensor for Water Pollution

Water pollution has created a critical threat to the environment.‎‎ A lot of research has been done ‎recently to use surface-enhanced Raman spectroscopy (SERS) to detect multiple pollutants in water. This study aims to use Ag colloid nanoflowers as liquid SERS enhancer. Tri sodium phosphate (Na3PO4) was investigated as a pollutant using liquid SERS ‎based on colloidal Ag ‎nanoflowers. The chemical method was used to synthesize nanoflowers from silver ‎ions. Atomic Force Microscope (AFM), Scanning Electron Microscope (SEM), and X-ray diffractometer (XRD) were employed to characterize the silver nanoflowers. This ‎nanoflowers SERS action in detecting Na3PO4 was reported and analyzed

... Show More
Crossref
View Publication Preview PDF
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Developing an Immune Negative Selection Algorithm for Intrusion Detection in NSL-KDD data Set

With the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica

... Show More
Crossref (1)
Crossref
View Publication Preview PDF