Preferred Language
Articles
/
pBaAVocBVTCNdQwC0kZu
Study of Some Characteristics in Dielectric Barrier Discharge (DBD) System
...Show More Authors

In this present paper, an experimental study of some plasma characteristics in dielectric barrier discharge (DBD) system using several variables, such as different frequencies and using two different electrodes metals(aluminium (Al) and copper (Cu)), is represented. The discharge plasma was produced by an AC power supply source of 6 and 7 kHz frequencies for the nitrogen gas spectrum and for two different electrodes metals(Al and Cu). Optical emission spectrometer was used to study plasma properties (such as electron temperature ( ), electron number density ( ), Debye length ( ), and plasma frequency ( )). In addition, images were analysed for the plasma emission intensity at atmospheric air pressure.

Publication Date
Thu Jun 04 2020
Journal Name
Journal Of Discrete Mathematical Sciences And Cryptography
User authentication system based specified brain waves
...Show More Authors

A security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear

... Show More
Scopus (7)
Scopus
Publication Date
Tue Mar 30 2021
Journal Name
Baghdad Science Journal
User-Oriented Preference Toward a Recommender System
...Show More Authors

            Nowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides informatio

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jun 01 2024
Journal Name
Journal Of Engineering
Intelligent Dust Monitoring System Based on IoT
...Show More Authors

Dust is a frequent contributor to health risks and changes in the climate, one of the most dangerous issues facing people today. Desertification, drought, agricultural practices, and sand and dust storms from neighboring regions bring on this issue. Deep learning (DL) long short-term memory (LSTM) based regression was a proposed solution to increase the forecasting accuracy of dust and monitoring. The proposed system has two parts to detect and monitor the dust; at the first step, the LSTM and dense layers are used to build a system using to detect the dust, while at the second step, the proposed Wireless Sensor Networks (WSN) and Internet of Things (IoT) model is used as a forecasting and monitoring model. The experiment DL system

... Show More
View Publication
Crossref (2)
Crossref
Publication Date
Tue Sep 08 2020
Journal Name
Baghdad Science Journal
RMSRS: Rover Multi-purpose Surveillance Robotic System
...Show More Authors

The development of the internet of things (IoT) and the internet of robotics (IoR) are becoming more and more involved with our daily lives. It serves a variety of tasks some of them are essential to us. The main objective of SRR is to develop a surveillance system for detecting suspicious and targeted places for users without any loss of human life. This paper shows the design and implementation of a robotic surveillance platform for real-time monitoring with the help of image processing, which can explorer places of difficult access or high risk. The robotic live streaming is via two cameras, the first one is fixed straight on the road and the second one is dynamic with tilt-pan ability. All cameras have image processing capabilities t

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Clarivate Crossref
Publication Date
Thu Aug 01 2019
Journal Name
International Journal Of Machine Learning And Computing
Emotion Recognition System Based on Hybrid Techniques
...Show More Authors

Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (23)
Scopus Crossref
Publication Date
Wed Apr 30 2025
Journal Name
Open Veterinary Journal
Anatomical differences in the biliary duct system between canines and felines: A review article
...Show More Authors

The liver is one of the largest glands in the digestive system and performs 13 various functions, including the secretion of hormones and enzymes. The gallbladder serves as a storage reservoir for secretions before they are released into the digestive system through the duodenum. The bile ducts branch from the liver’s lobes and ultimately connect to the digestive system, making this structure significant and distinct among different animal species. This review focuses on the differences between dogs and cats, highlighting the importance of these differences from both health and pathological perspectives. After conducting a detailed scientific review of the biliary tree in dogs and cats, we concluded that cats are more susceptible to the d

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2025
Journal Name
Open Veterinary Journal
Anatomical differences in the biliary duct system between canines and felines: A review article
...Show More Authors

The liver is one of the largest glands in the digestive system and performs 13 various functions, including the secretion of hormones and enzymes. The gallbladder serves as a storage reservoir for secretions before they are released into the digestive system through the duodenum. The bile ducts branch from the liver’s lobes and ultimately connect to the digestive system, making this structure significant and distinct among different animal species. This review focuses on the differences between dogs and cats, highlighting the importance of these differences from both health and pathological perspectives. After conducting a detailed scientific review of the biliary tree in dogs and cats, we concluded that cats are more susceptible

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 14 2025
Journal Name
South Eastern European Journal Of Public Health
Deep learning-based threat Intelligence system for IoT Network in Compliance With IEEE Standard
...Show More Authors

The continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre

... Show More
View Publication
Crossref
Publication Date
Tue Oct 29 2019
Journal Name
Journal Of Engineering
Demand Priority in a Power System With Wind Power Contribution Load Shedding Scheme Based
...Show More Authors

The load shedding  scheme has been extensively implemented as a fast solution for unbalance conditions. Therefore, it's crucial to investigate supply-demand balancing in order to protect the network from collapsing and to sustain stability as possible, however its implementation is mostly undesirable. One of the solutions to minimize the amount of load shedding is the integration renewable energy  resources, such as wind power, in the electric power generation could contribute significantly to minimizing power cuts as it is ability to positively improving the stability of the electric grid. In this paper propose a method for shedding the load base on the priority demands with incorporating the wind po

... Show More
View Publication Preview PDF
Crossref (9)
Crossref
Publication Date
Sun Oct 01 2017
Journal Name
13th International Symposium On Fiber-reinforced Polymer Reinforcement For Concrete Structures Frprcs 13
CFRP Repairing System at Openings in Reinforced Concrete T-Beams Cracked by Impact Loads
...Show More Authors