Preferred Language
Articles
/
pBiBkZgBVTCNdQwCmL-k
Neural Network Model for Synthesis of Thermally Sprayed (AI/AI<sub>2</sub>O<sub>3</sub>) Composite Protective Coatings
...Show More Authors
Abstract<p>Al<sub>2</sub>O<sub>3</sub> and Al<sub>2</sub>O<sub>3</sub>–Al composite coatings were deposited on steel specimens using Oxy-acetylene gas thermal spray gun. Alumina was mixed with Aluminum in six groups of concentrations (0, 5, 10,12,15 and 20% ) Al2O3, Specimens were tested for corrosion using Potentiodynamic polarization technique. Further tests were conducted for the effect of temperature on polarization curve and the hardness tests for the coated specimens. At first, Modelling was carried out using MINITAB-19, least square method, as a 2nd degree nonlinear model, bad results were achieved because of the high nonlinearity. Better result was achieved using neural network fitting tool. The network was designed using five neurons in the hidden layer and the input was I input with two layers, the electrical potential and alumina concentration.</p>
Scopus Crossref
View Publication
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (28)
Crossref (12)
Scopus Clarivate Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (19)
Crossref (9)
Scopus Crossref
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
Photocatalytic Performance of AgNPs-Zeolite Composite by Hydrothermal Synthesis for Water Splitting
...Show More Authors

Two samples of (Ag NPs-zeolite) nanocomposite thin films have been prepared by easy hydrothermal method for 4 hours and 8 hours inside the hydrothermal autoclave at temperatures of 100°C. The two samples were used in a photoelectrochemical cell as a photocatalyst inside a cell consisting of three electrodes: the working electrode photoanode (AgNPs-zeolite), platinum as a cathode electrode, and Ag/AgCl as a reference electrode, to study the performance of AgNPs-zeolite under dark current and 473 nm laser light for water splitting. The results show the high performance of an eight-hour sample with high crystallinity compared with a four-hour sample as a reliable photocatalyst to generate hydrogen for renewable energies.

 

View Publication Preview PDF
Crossref
Publication Date
Sun Jun 05 2016
Journal Name
Baghdad Science Journal
Synthesis and characterization Studies of Metal Complexes with Schiff base derived from 4-[5-(2-hydoxy-phenyl)-[1,3,4-oxadiazol-2-ylimino methyl]-1,5-dimethyl-2-phenyl-1,2-dihydro-pyrazol-3-one
...Show More Authors

New metal complexes of the ligand 4-[5-(2-hydoxy-phenyl)-[1,3,4- oxadiazol -2-ylimino methyl]-1,5-dimethyl-2-phenyl-1,2-dihydro-pyrazol-3-one (L) with the metal ions Co(II), Ni(II), Cu(II) and Zn(II) were prepared in alcoholic medium. The Schiff base was synthesized through condensate of [4-antipyrincarboxaldehyde] with[2-amino-5-(2-hydroxy-phenyl-1,3,4- oxadiazol] in alcoholic medium . Two tetradentate Schiff base ligand were used for complexation upon two metal ions of Co2+, Ni2+, Cu2+ and Zn2+ as dineucler formula M2L2.4H2O. The metal complexes were characterized by FTIR Spectroscopy, electronic Spectroscopy, elemental analysis, magnetic susceptidbility measurements, and also the ligand was characterized by 1H-NMR spectra, and m

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Theoretical Study of 4-(2-methyl-4-oxoquinazoline-3(4H)-yl) Benzoic acid with Some Transition Metal Ions
...Show More Authors

New complexes of the type [ML2(H2O)2] ,[FeL2(H2O)Cl] and [VOL2] were M=Co(II),Ni(II) and Cu(II) ,L=4-(2-methyl-4-oxoquinazoline-3(4H)-yl) benzoic acid were synthesized and characterized by element analysis, magnetic susceptibility ,molar conductance ,FT-IR and UV-visible. The studies indicate that the L acts as doubly monodentate bridge for metal ions and form mononuclear complexes. The complexes are found to be octahedral except V(IV) complex is square pyrimde shape . The structural geometries of compounds were also suggested in gas phase by theoretical treatments, using Hyper chem-6 program for the molecular mechanics and semi-empirical calculations, addition heat of formation(?Hf ?) and binding energy (?Eb)for the free ligan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Oct 25 2018
Journal Name
Al-nahrain Journal Of Science
Synthesis of some New 3-Substituted Heterocyclic Compounds Containing Bridgehead Nitrogen from 2-Amino Pyridine with Study Their Biological Activity
...Show More Authors

View Publication
Crossref
Publication Date
Fri Sep 25 2020
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Antibacterial, and Molecular Docking Study of Novel 2-Chloro-8-Methoxy-3-Aryl-[1,3] Benzoxazine Derivatives using Vilsmeier Reagent
...Show More Authors

Reducing of ethyl 4-((2-hydroxy-3-methoxybenzylidene)amino)benzoate (1) afford ethyl 4-((2-hydroxy-3-methoxybenzyl)amino)benzoate (2). Reaction of this compound with Vilsmeier reagent affords novel 2-chloro-[1,3] benzoxazine ring (3). The corresponding acid hydrazide of compound 3 was synthesized from reaction of compound (3) with hydrazine hydrate. Newly series of hydrazones (5a–i) were synthesized from reaction of acid hydrazide with various aryl aldehydes. Antibacterial activity of the hydrazones was secerned utilizing gram-negative and gram-positive bacteria. Compound (5b) and (5c) exhibited significant antibacterial ability against both gram-negative and gram-positive bacteria, while the compounds (5a) showed mild antibacteri

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref