Preferred Language
Articles
/
bsj-8968
Recognizing Different Foot Deformities Using FSR Sensors by Static Classification of Neural Networks
...Show More Authors

Sensing insole systems are a promising technology for various applications in healthcare and sports. They can provide valuable information about the foot pressure distribution and gait patterns of different individuals. However, designing and implementing such systems poses several challenges, such as sensor selection, calibration, data processing, and interpretation. This paper proposes a sensing insole system that uses force-sensitive resistors (FSRs) to measure the pressure exerted by the foot on different regions of the insole. This system classifies four types of foot deformities: normal, flat, over-pronation, and excessive supination. The classification stage uses the differential values of pressure points as input for a feedforward neural network (FNN) model. Data acquisition involved 60 subjects diagnosed with the studied cases. The implementation of FNN achieved an accuracy of 96.6% using 50% of the dataset as training data and 92.8% using only 30% training data. The comparison with related work shows good impact of using the differential values of pressure points as input for neural networks compared with raw data.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
Simulation and Modelling of Electricity Usage Control and Monitoring System using ThingSpeak
...Show More Authors

Renewable energy technology is growing fast especially photovoltaic (PV) system to move the conventional electricity generation and distribution towards smart grid. However, similar to monthly electricity bill, the PV energy producers can only monitor their energy PV generation once a month. Any malfuntion in PV system components may reduce the performance of the system without notice. Thus, developing a real-time monitoring system of PV production is very crucial for early detection. In addition, electricity consumption is also important to be monitored more frequently to increase energy savings awareness among consumers. Hardware based Internet-of-Thing (IoT) monitoring and control system is widely used. However, the implementation of

... Show More
View Publication Preview PDF
Scopus (7)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Fri Sep 30 2011
Journal Name
Al-khwarizmi Engineering Journal
Fuzzy Control of the Robotic Hands Catching Force Using Muscle Wires Actuator
...Show More Authors

The aim of this research is controlling the amount of the robotic hand catching force using the artificial muscle wire as an actuator to achieve the desired response of the robotic hand in order to catch different things without destroying or dropping them; where the process is to be similar to that of human hand catching way. The proper selection of the amount of the catching force is achieved through out simulation using the fuzzy control technique. The mechanism of the arrangement of the muscle wires is proposed to achieve good force selections. The results indicate the feasibility of using this proposed technique which mimics human reasoning where as the weight of the caught peace increases, the force increases also with approximatel

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
Improved Image Security in Internet of Thing (IOT) Using Multiple Key AES
...Show More Authors

Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the tran

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Tourism Companies Assessment via Social Media Using Sentiment Analysis
...Show More Authors

In recent years, social media has been increasing widely and obviously as a media for users expressing their emotions and feelings through thousands of posts and comments related to tourism companies. As a consequence, it became difficult for tourists to read all the comments to determine whether these opinions are positive or negative to assess the success of a tourism company. In this paper, a modest model is proposed to assess e-tourism companies using Iraqi dialect reviews collected from Facebook. The reviews are analyzed using text mining techniques for sentiment classification. The generated sentiment words are classified into positive, negative and neutral comments by utilizing Rough Set Theory, Naïve Bayes and K-Nearest Neighbor

... Show More
View Publication Preview PDF
Scopus (20)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Sat Sep 01 2018
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Planning For Reducing the Phenomenon of Tax EvasionBy Developing the Role of the Equitable: Distribution of TaxBurdens on TaxpayersAn Applied Research in the General Commission Of Taxes
...Show More Authors

 The tax base is one of the bases of the technical organizing of taxes,   and that a good selection of the tax base effects the outcome of the tax and its fairness, and with the expansion of the tax range results a dangerous phenomenon called tax evasion, which became threaten the economies of countries and this phenomenon prevents the achievement of the state to its economic, political and social objectives which seeks to resolve this phenomenon and identifying all human and material potential and realize the real reasons that lie behind it.   The researcher found that tax authorities are weak in terms of it the technical material and financial abilities, the analysis of data show that then is a significant reve

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
International Journal Of Electrical And Computer Engineering
Analysis of threats and security issues evaluation in mobile P2P networks
...Show More Authors

Technically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop

... Show More
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sun Aug 01 2021
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Simulation based comparison of routing protocols in wireless multihop adhoc networks
...Show More Authors

Routing protocols are responsible for providing reliable communication between the source and destination nodes. The performance of these protocols in the ad hoc network family is influenced by several factors such as mobility model, traffic load, transmission range, and the number of mobile nodes which represents a great issue. Several simulation studies have explored routing protocol with performance parameters, but few relate to various protocols concerning routing and Quality of Service (QoS) metrics. This paper presents a simulation-based comparison of proactive, reactive, and multipath routing protocols in mobile ad hoc networks (MANETs). Specifically, the performance of AODV, DSDV, and AOMDV protocols are evaluated and analyz

... Show More
View Publication
Crossref (13)
Crossref
Publication Date
Sat Sep 30 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Enhancing audit procedures in accordance with the international assurance standard through the implementation of a proposed program
...Show More Authors

Abstract:             

                  The research seeks to identify the role of the International Assurance Standard (3402) in the auditor's procedures, as the importance of the research stems from providing assurance services for control tools through reports that are prepared according to this standard, which contribute to strengthening audit procedures through a proposed assurance program. Many conclusions were reached, the most important of which The assurance operations are considered among the operations with a special assignme

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Seismic Effects and Static Analysis for the Artificial Damped Outrigger Systems in Tall R.C Buildings
...Show More Authors

This paper studies the combination fluid viscous dampers in the outrigger system to add supplementary damping into the structure, which purpose to remove the dependability of the structure to lower variable intrinsic damping. It works by connecting the central core, comprising either shear walls or braced frames, to the outer perimeter columns.

     The modal considered is a 36 storey square high rise reinforced concrete building. By constructing a discrete lumped mass model, and using frequency-based response function, two systems of dampers, parallel and series systems are studied. The maximum lateral load at the top of the building is calculated, and  this load  w

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2022
Journal Name
Journal Of Economics And Administrative Sciences
Improving Customer Value Through the Integral of Techniques Quality Function Deployment and Value Engineering
...Show More Authors

Health service institutions suffer from challenges resulting from the great changes that our world is witnessing today.  This has affected the value that these institutions add to the patient.

This research aims to identify the effect of integrating each of the techniques of QFD and value engineering for the health services provided to the patient to improve the value for him and thus obtain his satisfaction, which is reflected in the reputation of the surveyed hospitals. To achieve this, the descriptive analytical method was used, and a questionnaire was designed to collect the necessary data, which represents a measure of this research. The questionnaire was distri

... Show More
View Publication Preview PDF