Preferred Language
Articles
/
GhYMBYcBVTCNdQwCtC4L
Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network
...Show More Authors

Scopus Clarivate Crossref
View Publication
Publication Date
Fri Jun 01 2007
Journal Name
Al-khwarizmi Engineering Journal
Reduction of the error in the hardware neural network
...Show More Authors

Specialized hardware implementations of Artificial Neural Networks (ANNs) can offer faster execution than general-purpose microprocessors by taking advantage of reusable modules, parallel processes and specialized computational components. Modern high-density Field Programmable Gate Arrays (FPGAs) offer the required flexibility and fast design-to-implementation time with the possibility of exploiting highly parallel computations like those required by ANNs in hardware. The bounded width of the data in FPGA ANNs will add an additional error to the result of the output. This paper derives the equations of the additional error value that generate from bounded width of the data and proposed a method to reduce the effect of the error to give

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 29 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Oxidation Desulphurization of Heavy Naphtha Improved by Ultrasound Waves
...Show More Authors

The oxidation desulphurization assisted by ultrasound waves was applied to the desulphurization of heavy naphtha. Hydrogen peroxide and acetic acid were used as oxidants, ultrasound waves as phase dispersion, and activated carbon as solid adsorbent. When the oxidation desulphurization (ODS) process was followed by a solid adsorption step, the performance of overall Sulphur removal was 89% for heavy naphtha at the normal condition of pressure and temperature. The process of (ODS) converts the compounds of Sulphur to sulfoxides/ sulfones, and these oxidizing compounds can be removed by activated carbon to produce fuel with low Sulphur content. The absence of any components (hydrogen peroxide, acetic acid, ultrasound waves and activated car

... Show More
View Publication Preview PDF
Crossref (15)
Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Ieee Access
Smart Routing Management Framework Exploiting Dynamic Data Resources of Cross-Layer Design and Machine Learning Approaches for Mobile Cognitive Radio Networks: A Survey
...Show More Authors

View Publication
Scopus (20)
Crossref (21)
Scopus Clarivate Crossref
Publication Date
Wed Oct 17 2018
Journal Name
Journal Of Economics And Administrative Sciences
The impact of re-engineering of human resources in enhancing the morale of employees: Analytical research in Al - Rafidain University College
...Show More Authors

This research aims to study the degree to which human resources re-engineering programs contribute to enhancing the morale of employees , as it constitutes re-HR Software Engineering contemporary trend to redesign activities and tasks that can HR do a way that helps their organization to achieve its goals as part of the operating environment including dealing with all activities related variables, and the promotion of workers' morale is one of the selections that have to be addressed so that the senior management helps the organization to invest their human resources best possible way as posing the most valuable and rarest of resources enjoyed by comparison with her competitors.

The research problem has

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems Using Convolutional Neural Network
...Show More Authors

AA Abbass, HL Hussein, WA Shukur, J Kaabi, R Tornai, Webology, 2022 Individual’s eye recognition is an important issue in applications such as security systems, credit card control and guilty identification. Using video images cause to destroy the limitation of fixed images and to be able to receive users’ image under any condition as well as doing the eye recognition. There are some challenges in these systems; changes of individual gestures, changes of light, face coverage, low quality of video images and changes of personal characteristics in each frame. There is a need for two phases in order to do the eye recognition using images; revelation and eye recognition which will use in the security systems to identify the persons. The mai

... Show More
View Publication
Publication Date
Tue Feb 01 2022
Journal Name
Webology
Efficient Eye Recognition for Secure Systems using Convolutional Neural Network
...Show More Authors

Preview PDF
Publication Date
Tue Nov 01 2022
Journal Name
Journal Of Engineering
Artificial Neural Network Model for Wastewater Projects Maintenance Management Plan
...Show More Authors

Wastewater projects are one of the most important infrastructure projects, which require developing strategic plans to manage these projects. Most of the wastewater projects in Iraq don’t have a maintenance plan. This research aims to prepare the maintenance management plan (MMP) for wastewater projects. The objective of the research is to predict the cost and time of maintenance projects by building a model using ANN. The research sample included (15) completed projects in Wasit Governorate, where the researcher was able to obtain the data of these projects through the historical information of the Wasit Sewage Directorate. In this research artificial neural networks (ANN) technique was used to build two models (cost

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics
...Show More Authors

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Evaluating Roads Network Connectivity for Two Municipalities in Baghdad-Iraq
...Show More Authors

The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstraction and examin

... Show More
Crossref (4)
Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Journal Of Engineering
Evaluating Roads Network Connectivity for Two Municipalities in Baghdad-Iraq
...Show More Authors

The road network serves as a hub for opportunities in production and consumption, resource extraction, and social cohabitation. In turn, this promotes a higher standard of living and the expansion of cities. This research explores the road network's spatial connectedness and its effects on travel and urban form in the Al-Kadhimiya and Al-Adhamiya municipalities. Satellite images and paper maps have been employed to extract information on the existing road network, including their kinds, conditions, density, and lengths. The spatial structure of the road network was then generated using the ArcGIS software environment. The road pattern connectivity was evaluated using graph theory indices. The study demands the abstractio

... Show More
View Publication Preview PDF
Crossref (4)
Crossref