Preferred Language
Articles
/
joe-974
A Comparative Study of Various Intelligent Optimization Algorithms Based on Path Planning and Neural Controller for Mobile Robot
...Show More Authors

In this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal path. As well as, PSO algorithm is used to find and tune on-line the neural control gains values of the nonlinear neural controller to obtain the best torques actions of the wheels for the mining autonomous mobile robot. Simulation results by matlab showed that the proposed cognitive system is more accurate in terms of planning reference path to avoid obstacles and online finding and tuning parameters of the controller which generated smoothness control action without saturation state for tracking the reference path equation as well as minimize the mobile robot tracking pose error to zero value.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Wed Aug 28 2024
Journal Name
Mesopotamian Journal Of Cybersecurity
A Novel Anomaly Intrusion Detection Method based on RNA Encoding and ResNet50 Model
...Show More Authors

Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
International Journal Of Neutrosophic Science
A New Paradigm for Decision Making under Uncertainty in Signature Forensics Applications based on Neutrosophic Rule Engine
...Show More Authors

One of the most popular and legally recognized behavioral biometrics is the individual's signature, which is used for verification and identification in many different industries, including business, law, and finance. The purpose of the signature verification method is to distinguish genuine from forged signatures, a task complicated by cultural and personal variances. Analysis, comparison, and evaluation of handwriting features are performed in forensic handwriting analysis to establish whether or not the writing was produced by a known writer. In contrast to other languages, Arabic makes use of diacritics, ligatures, and overlaps that are unique to it. Due to the absence of dynamic information in the writing of Arabic signatures,

... Show More
View Publication Preview PDF
Scopus (6)
Scopus Crossref
Publication Date
Wed Jun 10 2009
Journal Name
Iraqi Journal Of Laser
Real Time Quantum Bit Error Rate Performance Test for a Quantum Cryptography System Based on BB84 protocol
...Show More Authors

In this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 07 2015
Journal Name
Baghdad Science Journal
A comparative study between conventional methods and Vidas UP Salmonella (SPT) to investigate salmonella species from local and imported meat
...Show More Authors

The study was preformed for investigating of Salmonella from meat, and compared Vidas UP Salmonella (SPT) with the traditional methods of isolation for Salmonella , were examined 42 meat samples (Beef and Chicken) from the Local and Imported From local markets in the city of Baghdad from period December 2013 -February 2014 the samples were cultured on enrichment and differential media and examined samples Vidas, and confirmed of isolates by cultivation chromgenic agar, biochemical tests ,Api20 E systeme , In addition serological tests , and the serotypes determinate in the Central Public Health Laboratory / National Institute of Salmonella The results showed the contamination in imported meat was more than in the local meat 11.9% and 2

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu May 18 2023
Journal Name
Journal Of Engineering
The Effect of Tool Path Strategy on Mechanical Properties of Brass (65-35) in Single Point Incremental Sheet Metal Forming (SPIF)
...Show More Authors

In this paper, three tool paths strategies; iso-planar, helical and adaptive have been implemented to investigates their effect on the mechanical properties of Brass 65-35 formed by single point incremental sheet metal forming process. To response this task, a fully digital integrated system from CAD modeling to finished part (CAD/CAM) for SPIF process has been developed in this paper.
The photo-micrographs shows an identical grain formation due to the plastic deformation of the incremental forming process, change in the grain shape and size was observed. It's found that the adaptive tool path play a significant role to increase the hardness of the formed specimen from (48 to 90 HV) and the grain texture of the formed specimen found a

... Show More
View Publication Preview PDF
Crossref (5)
Crossref
Publication Date
Sun Dec 03 2023
Journal Name
2023 Ieee International Conference On Energy Technologies For Future Grids (etfg)
Optimal Hybrid Type-2 Fuzzy-PID Controller for Blade Pitch Angle in Horizontal-axis Wind Turbines
...Show More Authors

In the modern world, wind turbine (WT) has become the largest source of renewable energy. The horizontal-axis wind turbine (HAWT) has higher efficiency than the vertical-axis wind turbine (VAWT). The blade pitch angle (BPA) of WT is controlled to increase output power generation over the rated wind speed. This paper proposes an accurate controller for BPA in a 500-kw HAWT. Three types of controllers have been applied and compared to find the best controller: PID controller (PIDC), fuzzy logic type-2 controller (T2FLC), and hybrid type-2 fuzzy-PID controller (T2FPIDC). This paper has been used Mamdani and Sugeno fuzzy inference systems (FIS) to find the best inference system for WT controllers. Furthermore, genetic algorithm (GA) and particl

... Show More
View Publication
Scopus (3)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 02 2017
Journal Name
Journal Of The College Of Languages (jcl)
Magic comparative study of the Old Testament mediator
...Show More Authors

Magic is an attempt to affect people or events either by cheating and charlatanry means or by expecting devil powers in order to bring advantage or to avoid a harm or to bring harm to others or to for see the future and divition .

     Magic is either real by the devil like writing majic works to prevent the marriage of someone and to depart the husband and his wife , causing someone to be distressed the physical and nervous diseases and stopping the stories and the project; majic can be artificial by being intellect and legerdemain and different types of triks and to cancel the magic by using magic or by protecting the self by using Talismans as well as presenting or offering sacrificers to the masters and th

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 03 2013
Journal Name
Baghdad Science Journal
Comparative study of oxidative stress in diabetes mellitus
...Show More Authors

The aim of the study was comparative between oxidative stress in diabetes mellitus using the measurement of some biophysical and biochemical parameters on two groups of diabetic patients, were conducted in the Al-Yarmuk Teaching Hospital,30 patients insulin dependent diabetes mellitus (IDDM) or type 1 ,their ages ranged between (15-45) and30 patients non- insulin dependent diabetes mellitus (NIDDM) or type 2,their ages ranged between (42-65).This study has been compared with 30 healthy subjects. The present study was demonstrated to evaluate the alteration in oxidative stress as measured by plasma and red blood cells Malondialdehyde (MDA) andchanges in antioxidant mechanism as measured by plasma and red blood cells Glutathione (GSH)

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 20 2018
Journal Name
Journal Of Economics And Administrative Sciences
Methods of Foreign Trade Payments -Comparative Accounting Study-
...Show More Authors

 The research has been concerned with the modalities of foreign trade payments (foreign trade financing), and made an accounting comparison between them to choose the best way to pay for the imported goods (payment of the real values of imported goods), given the importance of the impact of this activity on the national economy of all countries of the world, especially Iraq for the adoption of a very large amount of imported goods to meet the requirements of the people, which require the flow of huge amounts of foreign currency outside Iraq to pay for these goods, and therefore dealing incorrectly with it leads to the destruction of the national economy and the spread of a number of negative social and economic phenomena of

... Show More
View Publication Preview PDF
Crossref