Preferred Language
Articles
/
FBbWRYcBVTCNdQwCDEBD
Hybrid Recommendation System Approach for appropriate developer selection in Bug Repositories
...Show More Authors

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Oct 13 2019
Journal Name
Spe Kuwait Oil & Gas Show And Conference
Optimization of Fracture Parameters for Hydraulic Fractured Horizontal Well in a Heterogeneous Tight Reservoir: An Equivalent Homogeneous Modelling Approach
...Show More Authors
Abstract<p>Building numerical reservoir simulation model with a view to model actual case requires enormous amount of data and information. Such modeling and simulation processes normally require lengthy time and different sets of field data and experimental tests that are usually very expensive. In addition, the availability, quality and accessibility of all necessary data are very limited, especially for the green field. The degree of complexities of such modelling increases significantly especially in the case of heterogeneous nature typically inherited in unconventional reservoirs. In this perspective, this study focuses on exploring the possibility of simplifying the numerical simulation pr</p> ... Show More
View Publication
Scopus (24)
Crossref (15)
Scopus Crossref
Publication Date
Tue Mar 20 2018
Journal Name
Day 2 Wed, March 21, 2018
Numerical Approach for the Prediction of Formation and Hydraulic Fracture Properties Considering Elliptical Flow Regime in Tight Gas Reservoirs
...Show More Authors
Abstract<p>As tight gas reservoirs (TGRs) become more significant to the future of the gas industry, investigation into the best methods for the evaluation of field performance is critical. While hydraulic fractured well in TRGs are proven to be most viable options for economic recovery of gas, the interpretation of pressure transient or well test data from hydraulic fractured well in TGRs for the accurate estimation of important reservoirs and fracture properties (e.g. fracture length, fracture conductivity, skin and reservoir permeability) is rather very complex and difficult because of the existence of multiple flow profiles/regimes. The flow regimes are complex in TGRs due to the large hydraulic fractures n</p> ... Show More
View Publication
Scopus (14)
Crossref (8)
Scopus Crossref
Publication Date
Tue May 01 2018
Journal Name
International Journal Of Computer Trends And Technology
Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512
...Show More Authors

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on v

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Dec 13 2017
Journal Name
Al-khwarizmi Engineering Journal
Design of a Kinematic Neural Controller for Mobile Robots based on Enhanced Hybrid Firefly-Artificial Bee Colony Algorithm
...Show More Authors

The paper present design of a control structure that enables integration of a Kinematic neural controller for trajectory tracking of a nonholonomic differential two wheeled mobile robot, then  proposes a Kinematic neural controller to direct a National Instrument mobile robot (NI Mobile Robot). The controller is to make the actual velocity of the wheeled mobile robot close the required velocity by guarantees that the trajectory tracking mean squire error converges at minimum tracking error. The proposed tracking control system consists of two layers; The first layer is a multi-layer perceptron neural network system that controls the mobile robot to track the required path , The second layer is an optimization layer ,which is impleme

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 01 2026
Journal Name
Bioresource Technology
Hybrid Sono-Electro-Fenton (SEF) process driven by photovoltaic (PV) energy for sustainable hospital effluent treatment
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Tue Jun 22 2021
Journal Name
Expert Systems
Hybrid intelligent technology for plant health using the fusion of evolutionary optimization and deep neural networks
...Show More Authors

Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jun 29 2023
Journal Name
Iraqi Journal Of Computer, Communication, Control And System Engineering
Recognition of Upper Limb Movements Based on Hybrid EEG and EMG Signals for Human-Robot Interaction
...Show More Authors

Upper limb amputation is a condition that severely limits the amputee’s movement. Patients who have lost the use of one or more of their upper extremities have difficulty performing activities of daily living. To help improve the control of upper limb prosthesis with pattern recognition, non-invasive approaches (EEG and EMG signals) is proposed in this paper and are integrated with machine learning techniques to recognize the upper-limb motions of subjects. EMG and EEG signals are combined, and five features are utilized to classify seven hand movements such as (wrist flexion (WF), outward part of the wrist (WE), hand open (HO), hand close (HC), pronation (PRO), supination (SUP), and rest (RST)). Experiments demonstrate that usin

... Show More
View Publication
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Sun Oct 29 2023
Journal Name
Journal Of Al-qadisiyah For Computer Science And Mathematics
Optimization Techniques for Human Multi-Biometric Recognition System
...Show More Authors

Researchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa

... Show More
View Publication
Crossref
Publication Date
Wed Dec 31 2014
Journal Name
Iraqi Journal For Computers And Informatics
Gate Control System for New Iraqi License Plate
...Show More Authors

This paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref