This paper describes a new proposed structure of the Proportional Integral Derivative (PID) controller based on modified Elman neural network for the DC-DC buck converter system which is used in battery operation of the portable devices. The Dolphin Echolocation Optimization (DEO) algorithm is considered as a perfect on-line tuning technique therefore, it was used for tuning and obtaining the parameters of the modified Elman neural-PID controller to avoid the local minimum problem during learning the proposed controller. Simulation results show that the best weight parameters of the proposed controller, which are taken from the DEO, lead to find the best action and unsaturated state that will stabilize the Buck converter system performan
... Show MoreThe key objective of the study is to understand the best processes that are currently used in managing talent in Australian higher education (AHE) and design a quantitative measurement of talent management processes (TMPs) for the higher education (HE) sector.
The three qualitative multi-method studies that are commonly used in empirical studies, namely, brainstorming, focus group discussions and semi-structured individual interviews were considered. Twenty
The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreThe purpose of this study is to compare the influence of three teaching methods, as represented by problem-based learning (PBL), the PBL with lecture method, and the conventional teaching on undergraduate physics students' group work skills among bachelor’s degree physics students. In this study, the pre- and post-test were done and the instruments were administered to the students for data collection. The actual sample size comprises of 122 students, who were selected randomly from the physics department, college of education in iraq. Overall, the statistical results rejected null hypothesis of this study. Thus, using the PBL without or with lecture method enhances the skills of the group work among the bachelor’s degree physics studen
... Show MoreIn the recent years, some of the newly constructed asphalt concrete pavements in Baghdad as well as other cities across Iraq showed premature failures with consequential negative impact on both roadway safety and economy. Frequently, load associated mode of failure (rutting and fatigue) as well as, occasionally, moisture damage in some poorly drained sections are the main failure types found in those newly constructed road.
In this research, hydrated lime was introduced into asphalt concrete mixtures of wearing course in two methods. The first one was the addition of dry lime on dry aggregate and the second one was the addition of dry lime on saturated surface dry aggregate moisturized by 2.0 to 3.0 percent of wa
... Show MoreThe current research is concerned with methods of formation and their effect on the sintering process of ceramic materials. The research is divided into a number of chapters. The first chapter addressed the research structure (the research problem, importance, objective, limits, and it also defined the terms used in the research). The second chapter addressed the theoretical framework, where the theoretical framework has been divided into three sections. The first section dealt with methods of formation of ceramic materials including: Plasticizing method 2- semi-dry pressing method 3- dry pressing method 4- extrusion method 5- casting method.
The researcher found that there is a clear difference between the methods through her formati