Preferred Language
Articles
/
bsj-6568
3-D Packing in Container using Teaching Learning Based Optimization Algorithm
...Show More Authors

The paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items with 106 units, and large data which had 20 size-types of items with 110 units. Moreover, it was also compared with another algorithm called Gravitational Search Algorithm (GSA). According to the computational results in those example cases, it can be concluded that higher number of population and iterations can bring higher chances to obtain a better solution. Finally, TLBO shows better performance in solving the 3-D packing problem compared with GSA.          

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 30 2023
Journal Name
Aro-the Scientific Journal Of Koya University
Enhancing Upper Limb Prosthetic Control in Amputees Using Non-invasive EEG and EMG Signals with Machine Learning Techniques
...Show More Authors

Amputation of the upper limb significantly hinders the ability of patients to perform activities of daily living. To address this challenge, this paper introduces a novel approach that combines non-invasive methods, specifically Electroencephalography (EEG) and Electromyography (EMG) signals, with advanced machine learning techniques to recognize upper limb movements. The objective is to improve the control and functionality of prosthetic upper limbs through effective pattern recognition. The proposed methodology involves the fusion of EMG and EEG signals, which are processed using time-frequency domain feature extraction techniques. This enables the classification of seven distinct hand and wrist movements. The experiments conducte

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Mon Dec 11 2017
Journal Name
Al-khwarizmi Engineering Journal
Simulation Model of Wind Turbine Power Control System with Fuzzy Regulation by Mamdani and Larsen Algorithms
...Show More Authors

Abstract 

     The aim of this work is to create a power control system for wind turbines based on fuzzy logic. Three power control loop was considered including: changing the pitch angle of  the blade, changing the length of the blade and turning the nacelle. The stochastic law was given for changes and instant inaccurate assessment of wind conditions changes. Two different algorithms were used for fuzzy inference in the control loop, the Mamdani and Larsen algorithms. These two different algorithms are materialized and developed in this study in Matlab-Fuzzy logic toolbox which has been practically implemented using necessary intelligent control system in electrical engineerin

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Interaction between the Use of the Improve Strategy in Teaching Mathematics and Achievement Levels on the Acquisition of Algebraic Concepts and Habits of Mind among Tenth Grade Students in Oman
...Show More Authors

The current study aims to investigate the effect of the interaction between the use of the improve strategy in teaching mathematics and the level of academic achievement on the acquisition of algebraic concepts and habits of mind among tenth-grade students in Oman. The study adopted the experimental method, based on a quasi-experimental design with two groups: experimental and control groups and pre-post-measurement. The study sample consisted of (28) 10th-grade students as an experimental group and 26 of 10th-grade students as a control group in Al-Tufail bin Amr School in South Al Batinah. The differences in the pretest and posttest gains were analyzed using mean, standard deviation, ANCOVA, t-test, effect size (eta-square), and two-wa

... Show More
View Publication Preview PDF
Publication Date
Fri Mar 24 2017
Journal Name
Journal Of Engineering
Composite Techniques Based Color Image Compression
...Show More Authors

Compression for color image is now necessary for transmission and storage in the data bases since the color gives a pleasing nature and natural for any object, so three composite techniques based color image compression is implemented to achieve image with high compression, no loss in original image, better performance and good image quality. These techniques are composite stationary wavelet technique (S), composite wavelet technique (W) and composite multi-wavelet technique (M). For the high energy sub-band of the 3 rd level of each composite transform in each composite technique, the compression parameters are calculated. The best composite transform among the 27 types is the three levels of multi-wavelet transform (MMM) in M technique wh

... Show More
Publication Date
Sat Apr 30 2022
Journal Name
Revue D'intelligence Artificielle
Performance Evaluation of SDN DDoS Attack Detection and Mitigation Based Random Forest and K-Nearest Neighbors Machine Learning Algorithms
...Show More Authors

Software-defined networks (SDN) have a centralized control architecture that makes them a tempting target for cyber attackers. One of the major threats is distributed denial of service (DDoS) attacks. It aims to exhaust network resources to make its services unavailable to legitimate users. DDoS attack detection based on machine learning algorithms is considered one of the most used techniques in SDN security. In this paper, four machine learning techniques (Random Forest, K-nearest neighbors, Naive Bayes, and Logistic Regression) have been tested to detect DDoS attacks. Also, a mitigation technique has been used to eliminate the attack effect on SDN. RF and KNN were selected because of their high accuracy results. Three types of ne

... Show More
View Publication
Scopus (23)
Crossref (12)
Scopus Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
A Fixed Point Theorem for L-Contraction in Generalized D-Metric Spaces
...Show More Authors

We define L-contraction mapping in the setting of D-metric spaces analogous to L-contraction mappings [1] in complete metric spaces. Also, give a definition for general D- matric spaces.And then prove the existence of fixed point for more general class of mappings in generalized D-metric spaces.

View Publication Preview PDF
Crossref
Publication Date
Sun Sep 25 2022
Journal Name
Research Journal Of Biotechnology
Evaluation of Interlukein-6 and Vitamin D in Patients with COVID-19
...Show More Authors

COVID-19 is a unique viral infectious illness that causes a variety of symptoms and health hazards, particularly to the respiratory system and has been declared a worldwide pandemic. The disease is characterized by a cytokine release in severe conditions. Interleukin-6 (IL-6), a proinflammatory cytokine, mediates an important immunomodulatory process. Also, vitamin D was identified to have a role in the innate immunity of individuals. Our study was designed to find the role of IL-6 and vitamin D in COVID-19 patients, as well as, to see whether there is a link between vitamin D deficiency and cytokine syndrome development. The study included 90 COVID-19 patients and 30 control people from Baghdad, Iraq. The age of the participants was non-s

... Show More
View Publication
Scopus Crossref
Publication Date
Mon Jun 30 2014
Journal Name
Al-kindy College Medical Journal
Evaluation of D-Dimer in the diagnosis of suspected deep vein thrombosis
...Show More Authors

Background: Deep vein thrombosis is a multi causal disease and its one of most common venous disorder, but only one quarter of the patients who have signs and symptoms of a clot in the vein actually have thrombosis and need treatment .The disease can be difficult to diagnose. Venous ultrasound in combination with clinical finding is accurate for venous thromboembolism, its costly because a large number of patients with suspicious signs and symptoms. Venography still the gold standard for venous thromboembolism but it is invasive. The D-dimer increasingly is being seen as valuable tool rolling out venous thromboembolism and sparing low risk patients for further workup.Objectives: this study has designed the role of D-dimer to confirm diag

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Annals Of Medicine And Surgery
Plasma d-dimer level correlated with advanced breast carcinoma in female patients
...Show More Authors

View Publication
Scopus (12)
Crossref (13)
Scopus Crossref
Publication Date
Mon Apr 30 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
An efficient artificial fish swarm algorithm with harmony search for scheduling in flexible job-shop problem
...Show More Authors

Flexible job-shop scheduling problem (FJSP) is one of the instances in flexible manufacturing systems. It is considered as a very complex to control. Hence generating a control system for this problem domain is difficult. FJSP inherits the job-shop scheduling problem characteristics. It has an additional decision level to the sequencing one which allows the operations to be processed on any machine among a set of available machines at a facility. In this article, we present Artificial Fish Swarm Algorithm with Harmony Search for solving the flexible job shop scheduling problem. It is based on the new harmony improvised from results obtained by artificial fish swarm algorithm. This improvised solution is sent to comparison to an overall best

... Show More
View Publication Preview PDF
Scopus (3)
Scopus