Preferred Language
Articles
/
ijcpe-317
Optimal Design of Cylinderical Ectrode Using Neural Network Modeling for Electrochemical Finishing
...Show More Authors

The finishing operation of the electrochemical finishing technology (ECF) for tube of steel was investigated In this study. Experimental procedures included qualitative
and quantitative analyses for surface roughness and material removal. Qualitative analyses utilized finishing optimization of a specific specimen in various design and operating conditions; value of gap from 0.2 to 10mm, flow rate of electrolytes from 5 to 15liter/min, finishing time from 1 to 4min and the applied voltage from 6 to 12v, to find out the value of surface roughness and material removal at each electrochemical state. From the measured material removal for each process state was used to verify the relationship with finishing time of work piece. Electrochemical finishing proves an effective method to reduce the surface roughness (Ra) from 1.6μm to 0.1μm in 4 min. Finally, the observed relationships were used to predicate the diameter of blank, tool diameter and flow rate by neural network modeling ANN which has inputs defined by the finished hole diameter, surface roughness, and finishing time. Three of hidden layers and their neurons were found by an integration procedure. The design charts observed from this study utilize the designers in predication of diameter for blank and design of electrode.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Dec 02 2024
Journal Name
Engineering, Technology & Applied Science Research
An Artificial Neural Network Prediction Model of GFRP Residual Tensile Strength
...Show More Authors

This study uses an Artificial Neural Network (ANN) to examine the constitutive relationships of the Glass Fiber Reinforced Polymer (GFRP) residual tensile strength at elevated temperatures. The objective is to develop an effective model and establish fire performance criteria for concrete structures in fire scenarios. Multilayer networks that employ reactive error distribution approaches can determine the residual tensile strength of GFRP using six input parameters, in contrast to previous mathematical models that utilized one or two inputs while disregarding the others. Multilayered networks employing reactive error distribution technology assign weights to each variable influencing the residual tensile strength of GFRP. Temperatur

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Crossref
Publication Date
Wed Jun 12 2013
Journal Name
International Journal Of Computer Applications
Design and Implementation of a Practical FTTH Network
...Show More Authors

Fiber-to-the-Home (FTTH) has long been recognized as a technology that provides future proof bandwidth [1], but has generally been too expensive to implement on a wide scale. However, reductions in the cost of electro-optic components and improvements in the handling of fiber optics now make FTTH a cost effective solution in many situations. The transition to FTTH in the access network is also a benefit for both consumers and service providers because it opens up the near limitless capacity of the core long-haul network to the local user. In this paper individual passive optical components, transceivers, and fibers has been put together to form a complete FTTH network. Then the implementation of the under construction Baghdad/Al

... Show More
View Publication Preview PDF
Publication Date
Fri Dec 29 2017
Journal Name
Al-khwarizmi Engineering Journal
Design and Implementation of a Proposal Network Firewall
...Show More Authors

 

In today's world, most business, regardless of size, believe that access to Internet is imperative if they are going to complete effectively. Yet connecting a private computer (or a network) to the Internet can expose critical or confidential data to malicious attack from anywhere in the world since unprotected connections to the Internet (or any network topology) leaves the user computer vulnerable to hacker attacks and other Internet threats. Therefore, to provide high degree of protection to the network and network's user, Firewall need to be used.

Firewall provides a barrier between the user computer and the Internet (i.e. it prevents unauthor

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 30 2021
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
ELECTROCHEMICAL PREPARATION OF A MOLECULAR IMPRINTED POLYMER ELECTRODE FOR ESTEMATION OF ASPIRIN USING TWO DIFFERENT FUNCTIONAL MONOMERS.: ELECTROCHEMICAL PREPARATION OF A MOLECULAR IMPRINTED POLYMER ELECTRODE FOR ESTEMATION OF ASPIRIN USING TWO DIFFERENT FUNCTIONAL MONOMERS.
...Show More Authors

For aspirin estimated, a molecularly imprinted polymer MIP-ASP electrodes were generated by electro-polymerization process, the electrodes were prepared by combining the template (aspirin) with (vinyl acetate (VA), 1-vinylimidizole (VIZ) as a functional monomer and N, N-methylene bisacrylamide (MBAA) as crosslinkers using benzoyl peroxide (BPO) as an initiator. The efficiency of the membrane electrodes was analyzed by differential pulse voltammetry (DPV). Four electrodes were synthesized using two different plasticizers, di-butyl sebacate (DBS), di-octyl phthalate (DOP) in PVC matrix. Scanning electron microscopy (SEM) was used to describe the generated MIP, studying the electrodes properties, the slope, detection limit, and life

... Show More
View Publication Preview PDF
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Desalination And Water Treatment
Optimization of chemical oxygen demand removal from petroleum refinery wastewater by electrocoagulation using tubular electrochemical reactor with a novel design
...Show More Authors

View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Tue Mar 31 2015
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Electrochemical removal of copper from synthetic wastewater using rotating cylinder electrode
...Show More Authors

The performance of a batch undivided electrochemical reactor with a rotating cylinder electrode of woven-wire (60 mesh size), stainless steel 316, is examined for the removal of copper from synthetic solution of o.5 M sodium chloride containing 125 ppm at pH ≈ 3.5. The effect of total applied current, rotation speed on the figures of merit of the reactor is analyzed. For an applied current of 300 mA at 100 rpm, the copper concentration decreased from 125 to  mg l-1 after 60 min of electrolysis with a specific energy consumption of 1.75 kWh kg-1 and a normalized space velocity of 1.62 h-1. The change in concentration was higher when the total applied currents were increased because of the turbulence

... Show More
View Publication Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (10)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref