Preferred Language
Articles
/
mBi_hZgBVTCNdQwCXr7_
Investigating Forward kinematic Analysis of a 5-axes Robotic Manipulator using Denavit-Hartenberg Method and Artificial Neural Network
...Show More Authors

Crossref
View Publication
Publication Date
Mon Dec 01 2014
Journal Name
Advances In Engineering Software
System identification and control of robot manipulator based on fuzzy adaptive differential evolution algorithm
...Show More Authors

View Publication
Scopus (53)
Crossref (46)
Scopus Clarivate Crossref
Publication Date
Mon Jan 01 2024
Journal Name
The Scientific World Journal
Efficient Removal of Brilliant Green Dye Using Mesoporous Attapulgite Clay: Investigating Adsorption Kinetics, Isotherms, and Mechanisms
...Show More Authors

The study involved the effectiveness of Iraqi attapulgite (IQATP) clay as an environmentally friendly material that easily adsorbs brilliant green (BG) dye from water systems and is identified by various complementary methods (e.g., FTIR, SEM‐EDS, XRD, ICP‐OES, pHpzc, and BET), where the result reported that the IQATP specific surface area is 29.15 m2/g. A systematic analysis was selected to evaluate the impact of different effective adsorption performance variables on BG dye decontamination. These variables included IQATP dosage (0.02–0.8 g/L), solution pH (3.05–8.15), contact time (ranging from 2 to 25 min), and initial BG dye concentration from 20 to 80 mg/L. The parameter

... Show More
View Publication
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Sat Aug 02 2025
Journal Name
Engineering, Technology & Applied Science Research
A New Method for Face-Based Recognition Using a Fuzzy Face Deep Model
...Show More Authors

Face recognition is a crucial biometric technology used in various security and identification applications. Ensuring accuracy and reliability in facial recognition systems requires robust feature extraction and secure processing methods. This study presents an accurate facial recognition model using a feature extraction approach within a cloud environment. First, the facial images undergo preprocessing, including grayscale conversion, histogram equalization, Viola-Jones face detection, and resizing. Then, features are extracted using a hybrid approach that combines Linear Discriminant Analysis (LDA) and Gray-Level Co-occurrence Matrix (GLCM). The extracted features are encrypted using the Data Encryption Standard (DES) for security

... Show More
View Publication
Scopus Crossref
Publication Date
Thu Jun 01 2017
Journal Name
International Journal Of Applied Engineering Research
A Proposed Method for Generating a Private Key Using Digital Color Image Features
...Show More Authors

In this paper, the goal of proposed method is to protect data against different types of attacks by unauthorized parties. The basic idea of proposed method is generating a private key from a specific features of digital color image such as color (Red, Green and Blue); the generating process of private key from colors of digital color image performed via the computing process of color frequencies for blue color of an image then computing the maximum frequency of blue color, multiplying it by its number and adding process will performed to produce a generated key. After that the private key is generated, must be converting it into the binary representation form. The generated key is extracted from blue color of keyed image then we selects a c

... Show More
Publication Date
Mon Dec 30 2013
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Permeability Prediction of Un-Cored Intervals Using FZI Method and Matrix Density Grouping Method: A Case Study of Abughirab Field/Asmari FM., Iraq
...Show More Authors

Knowledge of permeability is critical for developing an effective reservoir description. Permeability data may be calculated from well tests, cores and logs. Normally, using well log data to derive estimates of permeability is the lowest cost method. This paper will focus on the evaluation of formation permeability in un-cored intervals for Abughirab field/Asmari reservoir in Iraq from core and well log data. Hydraulic flow unit (HFU) concept is strongly related to the flow zone indicator (FZI) which is a function of the reservoir quality index (RQI). Both measures are based on porosity and permeability of cores. It is assumed that samples with similar FZI values belong to the same HFU. A generated method is also used to calculate permea

... Show More
View Publication Preview PDF
Publication Date
Sun Apr 05 2026
Journal Name
Journal Of Engineering
Aerodynamic Characteristics of a Rectangular Wing Using Non-Linear Vortex Ring Method
...Show More Authors

The aerodynamic characteristics of general three-dimensional rectangular wings are considered using non-linear interaction between two-dimensional viscous-inviscid panel method and vortex ring method. The potential flow of a two-dimensional airfoil by the pioneering Hess & Smith method was used with viscous laminar, transition and turbulent boundary layer to solve flow about complex configuration of airfoils including stalling effect. Viterna method was used to extend the aerodynamic characteristics of the specified airfoil to high angles of attacks. A modified vortex ring method was used to find the circulation values along span wise direction of the wing and then interacted with sectional circulation obtained by Kutta-Joukowsky theorem of

... Show More
View Publication
Publication Date
Sun Jan 01 2012
Journal Name
كلية التربية-الجامعة المستنصرية
Study the diffusion of Hydrogen in metals using a Runge-Kutta method
...Show More Authors

Publication Date
Sat Mar 01 2025
Journal Name
Iraqi Journal Of Physics
Design an Efficient Neural Network to Determine the Rate of Contamination in the Tigris River in Baghdad City
...Show More Authors

This article proposes a new technique for determining the rate of contamination. First, a generative adversarial neural network (ANN) parallel processing technique is constructed and trained using real and secret images. Then, after the model is stabilized, the real image is passed to the generator. Finally, the generator creates an image that is visually similar to the secret image, thus achieving the same effect as the secret image transmission. Experimental results show that this technique has a good effect on the security of secret information transmission and increases the capacity of information hiding. The metric signal of noise, a structural similarity index measure, was used to determine the success of colour image-hiding t

... Show More
View Publication
Crossref
Publication Date
Tue Aug 27 2024
Journal Name
Tem Journal
Preparing the Electrical Signal Data of the Heart by Performing Segmentation Based on the Neural Network U-Net
...Show More Authors

Research on the automated extraction of essential data from an electrocardiography (ECG) recording has been a significant topic for a long time. The main focus of digital processing processes is to measure fiducial points that determine the beginning and end of the P, QRS, and T waves based on their waveform properties. The presence of unavoidable noise during ECG data collection and inherent physiological differences among individuals make it challenging to accurately identify these reference points, resulting in suboptimal performance. This is done through several primary stages that rely on the idea of preliminary processing of the ECG electrical signal through a set of steps (preparing raw data and converting them into files tha

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Thu Jan 29 2026
Journal Name
Journal Of Interdisciplinary Mathematics
Efficient design of neural network based on modified LM training algorithm for solving nonlinear 4th order 3D-PDEs 
...Show More Authors

Authors in this work design efficient neural networks, which are based on the modified Levenberg - Marquardt (LM) training algorithms to solve non-linear fourth - order three -dimensional partial differential equations in the two kinds in the periodic and in the non-periodic - Periodic. Software reliability growth models are essential tools for monitoring and evaluating the evolution of software reliability. Software defect detection events that occur during testing and operation are often treated as counting processes in many current models. However, when working with large software systems, the error detection process should be viewed as a random process with a continuous state space, since the number of faults found during testin

... Show More
View Publication Preview PDF
Scopus Crossref