Preferred Language
Articles
/
joe-468
Design a Multi-Choice Fuzzy Control System of the Greenhouse
...Show More Authors

Applications of nonlinear, time variant, and variable parameters represent a big challenge in a conventional control systems, the control strategy of the fuzzy systems may be represents a simple, a robust and an intelligent solution for such applications.

This paper presents a design of fuzzy control system that consists of three sub controllers; a fuzzy temperature controller (FC_T), a fuzzy humidity controller (FC_H) and a ventilation control system; to control the complicate environment of the greenhouse (GH) using a proposed multi-choice control system approach. However, to reduce the cost of the crop production in the GH, the first choice is using the ventilation system to control the temperature and humidity of the GH environment according to the external climate if it is possible, if it is not possible then the second choice uses the FC_T to actuate the cooling-heating system to control the temperature and FC_H to actuate the humidifier-dehumidifier to control the humidity of the GH environment. The resultant is a robust, multi choice and multi-mode capability system. The designed system reflects the fuzzy system capability to deal with complicated environments and its flexibility to use the same design in controlling different applications.

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Dec 01 2015
Journal Name
Journal Of Engineering
Improved Automatic Registration Adjustment of Multi-source Remote Sensing Datasets
...Show More Authors

Registration techniques are still considered challenging tasks to remote sensing users, especially after enormous increase in the volume of remotely sensed data being acquired by an ever-growing number of earth observation sensors. This surge in use mandates the development of accurate and robust registration procedures that can handle these data with varying geometric and radiometric properties. This paper aims to develop the traditional registration scenarios to reduce discrepancies between registered datasets in two dimensions (2D) space for remote sensing images. This is achieved by designing a computer program written in Visual Basic language following two main stages: The first stage is a traditional registration process by de

... Show More
Crossref (1)
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Civil And Environmental Engineering
Performance of Prestressed Concrete Hunched Beams with Multi-Quadrilaterals Openings
...Show More Authors
Abstract<p>A long-span Prestressed Concrete Hunched Beam with Multi-Quadrilateral Opening has been developed as an alternative to steel structural elements. An experimental program was created and evaluated utilizing a single mid-span monotonic static load on simply supported beams, which included six beams with openings and the solid control beam without openings, to investigate the performance of such beams. The number and height of the quadrilateral openings are the variables to consider. According to test results, the presence of openings in the prestressed concrete hunched beam with multi-quadrilateral opening did not considerably affect their ultimate load capacity with respect to a contro</p> ... Show More
View Publication Preview PDF
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Baghdad Science Journal
Discussing Fuzzy Reliability Estimators of Function of Mixed Probability Distribution By Simulation
...Show More Authors

This paper deals  with constructing mixed probability distribution  from exponential with scale parameter (β) and also Gamma distribution with (2,β), and the mixed proportions are (  .first of all, the probability density function (p.d.f) and also cumulative distribution function (c.d.f) and also the reliability function are obtained. The parameters of mixed distribution, ( ,β)  are estimated by three different methods, which are  maximum likelihood, and  Moments method,as well proposed method (Differential Least Square Method)(DLSM).The comparison is done using simulation procedure, and all the results are explained in tables.

View Publication Preview PDF
Scopus (1)
Scopus Clarivate Crossref
Publication Date
Mon Mar 27 2023
Journal Name
8th Engineering And 2nd International Conference For College Of Engineering – University Of Baghdad: Coec8-2021 Proceedings
Evaluation of the capability of Shatt Al-Arab River to control flood discharge
...Show More Authors

Abstract. Shatt Al-Arab River was the most important tide river in Iraq, it suffered from neglect and lack of maintenance in the past decades. The river embankment is constantly exposed to erosion processes due to several factors, one of the most important of these factors is the movement of water currents due to the tidal energy coming from the Arabian Gulf. In this study, one dimension unsteady-state model was implemented to study river flood capacity simulation by using HEC-RAS (5.0.7) software in Shatt Al Arab River and its tributaries. The data included flow rate, water level records were collected daily from 2018 to 2020 at different stations along the mentioned river and its feeders, additionally, the considered flood discharge data

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Political Sciences Journal
US-Russian Interventions in the Caspian-Caucasus Basin Countries after 2001: (Strategies to Re-Impose Control and Influence as a Model)
...Show More Authors

Today, the five Caspian riparian states on the shores of the Caspian Sea (Kazakhstan, Turkmenistan, Azerbaijan, Russia, and Iran) have become a front for ambitions and international and regional competition, especially in light of the features and characteristics that natural geography has endowed them with and their enjoyment of a group of economic and mineral wealth that are not optimally exploited so far which made it a strategic attraction area for international trends and interventions, especially Western ones. It is a battleground for major international companies aiming to monopolize promising industrial investments in order to impose control and influence on the region’s resources and economic wealth and thus impose their forei

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 29 2025
Journal Name
Journal Of Applied Engineering And Technological Science (jaets)
Using Fuzzy Cognitive Maps For Modeling Environmental Aspect of Sustainable Development in Construction Projects
...Show More Authors

The pillars of sustainable development are representing the interface between environmental, economic, and social sustainability. Sustainable development is a method of planning and managing construction projects to reduce the effect of the construction process on the environment so that there is a balance between environmental capabilities and the human needs of present and future generations. Usually, Environmental sustainability is most important and effective in construction projects. The environment suffers from significant negative impacts as a result of the implementation of construction projects; therefore, this study aims to identify the effecting factors on environmentally sustainable development. The methodology of this s

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 01 2022
Journal Name
Baghdad Science Journal
Enhancement Ear-based Biometric System Using a Modified AdaBoost Method
...Show More Authors

          The primary objective of this paper is to improve a biometric authentication and classification model using the ear as a distinct part of the face since it is unchanged with time and unaffected by facial expressions. The proposed model is a new scenario for enhancing ear recognition accuracy via modifying the AdaBoost algorithm to optimize adaptive learning. To overcome the limitation of image illumination, occlusion, and problems of image registration, the Scale-invariant feature transform technique was used to extract features. Various consecutive phases were used to improve classification accuracy. These phases are image acquisition, preprocessing, filtering, smoothing, and feature extraction. To assess the proposed

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue Oct 01 2019
Journal Name
2019 Ieee 9th International Conference On System Engineering And Technology (icset)
A Digital Signature System Based on Real Time Face Recognition
...Show More Authors

This study proposed a biometric-based digital signature scheme proposed for facial recognition. The scheme is designed and built to verify the person’s identity during a registration process and retrieve their public and private keys stored in the database. The RSA algorithm has been used as asymmetric encryption method to encrypt hashes generated for digital documents. It uses the hash function (SHA-256) to generate digital signatures. In this study, local binary patterns histograms (LBPH) were used for facial recognition. The facial recognition method was evaluated on ORL faces retrieved from the database of Cambridge University. From the analysis, the LBPH algorithm achieved 97.5% accuracy; the real-time testing was done on thirty subj

... Show More
View Publication Preview PDF
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Fri May 31 2019
Journal Name
Journal Of Engineering
WSN-WCCS: A Wireless Sensor Network Wavelet Curve Ciphering System
...Show More Authors

With wireless sensor network (WSN) wide applications in popularity, securing its data becomes a requirement. This can be accomplished by encrypting sensor node data. In this paper a new an efficient symmetric cryptographic algorithm is presented. This algorithm is called wireless sensor network wavelet curve ciphering system (WSN-WCCS).  The algorithm idea based on discrete wavelet transformation to generate keys for each node in WSN.  It implements on hierarchical clustering WSN using LEACH protocol. Python programming language version 2.7 was used to create the simulator of WSN framework and implement a WSN-WCCS algorithm. The simulation result of the proposed WSN-WCCS with other symmetric algorithms has show

... Show More
View Publication Preview PDF
Crossref