Preferred Language
Articles
/
vxeWNY8BVTCNdQwCJ2Gf
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Intelligent Congestion Control of 5G Traffic in SDN using Dual-Spike Neural Network
...Show More Authors

Software Defined Networking (SDN) with centralized control provides a global view and achieves efficient network resources management. However, using centralized controllers has several limitations related to scalability and performance, especially with the exponential growth of 5G communication. This paper proposes a novel traffic scheduling algorithm to avoid congestion in the control plane. The Packet-In messages received from different 5G devices are classified into two classes: critical and non-critical 5G communication by adopting Dual-Spike Neural Networks (DSNN) classifier and implementing it on a Virtualized Network Function (VNF). Dual spikes identify each class to increase the reliability of the classification

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed May 31 2017
Journal Name
Al-khwarizmi Engineering Journal
Corrosion control of Buried Low Carbon Steel Structure by Using Alteration Medias method
...Show More Authors


Abstract

The aim of the present work is to control of metal buried corrosion by alteration the media method. This method depended on the characteristics of each media. The corrosion rates in different media (soil, sand, porcelanite stone and gravel) for specimens of low carbon steel were measured by two methods weight loss method and polarization method, weight loss measured by buried specimens in these medias separately for 90 days. The polarization method includes preparing of specimen and salt solutions have electrical resistivity equivalent electrical resistivity of these media. The corrosion rate of two method results in (soil > sand> porcelainte stone> gravel). The lower corrosion rate happene

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 01 2012
Journal Name
Journal Of Engineering
Statistical Quality Control of Industrial Products at the General Company for Vegetable Oils
...Show More Authors

This research includes the using of statistical to improve the quality of can plastics which is produced at the state company for Vegetable oils (Almaamon factory ) by using the percentage defective control chart ( p-chart ) of a fixed sample. A sample of size (450) cans daily for (30) days was selected to determine the rejected product . Operations research with a (win QSB ) package for ( p-chart ) was used to determine test quality level required for product specification to justify that the process that is statistically controlled.
The results show high degree of accuracy by using the program and the mathematical operations (primary and secondary ) which used to draw the control limits charts and to reject the statistically uncontr

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed May 01 2013
Journal Name
Ieee Journal Of Biomedical And Health Informatics
Classification of Finger Movements for the Dexterous Hand Prosthesis Control With Surface Electromyography
...Show More Authors

View Publication
Scopus (303)
Crossref (275)
Scopus Clarivate Crossref
Publication Date
Sun Dec 03 2017
Journal Name
Baghdad Science Journal
The Efficiency of Using Ozone Gas and Heat to Control Larvae and Adult Stage of Red Flour Beetle, Tribolium castaneum (Herbst) (Coleoptera: Tenebrionidae)
...Show More Authors

The effect of ozone gas with temperatures 35. 40 and 45 Celsius to control on larval and adult stages of Tribolium castaneum was tested and at time of exposure 1.0, 3.0, 7.0, 9.0, 11.0, 13.0 hours and the level of relative humidity prevailing during the test 45 ± 1%. Results showed significant differences between the exposure times, when the percentage of mortality 100% between larvae (primary, intermediate and advanced) in the treatment effect at a temperature of 35 Celsius with ozone gas at exposure time to 9.0, 11.0, 11.0 hours for the three ages respectively, and adult (male and female) in the same treatment when the three heat degrees had given ratios the total mortality reached 100% of both males at exposure time to 7.0 ,3

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Crossref
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.

Publication Date
Fri Mar 30 2001
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
The Control of Powder Detergent Bulk Density by Means of Counter current Spray Dryer
...Show More Authors

View Publication Preview PDF
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Engineering
Evaluation of the Current Status of the Cost Control Processes in Iraqi Construction Projects
...Show More Authors

One of the most important problems of Iraqi construction projects is the cost variances, so it is important to identify the problems and shortcomings that cause poor cost control. Through the utilization of questionnaires, the study evaluated how project costs were managed and reported. The questionnaire was distributed to 180 professionals working in the Iraqi construction sector, with a response rate of 91%. The results showed that a high percentage of projects are implemented with a difference between real and estimated costs, and the process of documenting cost data needs to be more secure. On the other hand, there is a weakness in providing the necessary work structure information to monitor costs and a lack of proc

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Sun Jan 01 2017
Journal Name
Iraqi Journal Of Science
Strong Triple Data Encryption Standard Algorithm using Nth Degree Truncated Polynomial Ring Unit
...Show More Authors

Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to

... Show More