Preferred Language
Articles
/
pBiBkZgBVTCNdQwCmL-k
Neural Network Model for Synthesis of Thermally Sprayed (AI/AI<sub>2</sub>O<sub>3</sub>) Composite Protective Coatings
...Show More Authors
Abstract<p>Al<sub>2</sub>O<sub>3</sub> and Al<sub>2</sub>O<sub>3</sub>–Al composite coatings were deposited on steel specimens using Oxy-acetylene gas thermal spray gun. Alumina was mixed with Aluminum in six groups of concentrations (0, 5, 10,12,15 and 20% ) Al2O3, Specimens were tested for corrosion using Potentiodynamic polarization technique. Further tests were conducted for the effect of temperature on polarization curve and the hardness tests for the coated specimens. At first, Modelling was carried out using MINITAB-19, least square method, as a 2nd degree nonlinear model, bad results were achieved because of the high nonlinearity. Better result was achieved using neural network fitting tool. The network was designed using five neurons in the hidden layer and the input was I input with two layers, the electrical potential and alumina concentration.</p>
Scopus Crossref
View Publication
Publication Date
Thu Oct 25 2018
Journal Name
Al-nahrain Journal Of Science
Synthesis of some New 3-Substituted Heterocyclic Compounds Containing Bridgehead Nitrogen from 2-Amino Pyridine with Study Their Biological Activity
...Show More Authors

View Publication
Crossref
Publication Date
Sun Sep 01 2013
Journal Name
Baghdad Science Journal
Synthesis and Theoretical Study of 4-(2-methyl-4-oxoquinazoline-3(4H)-yl) Benzoic acid with Some Transition Metal Ions
...Show More Authors

New complexes of the type [ML2(H2O)2] ,[FeL2(H2O)Cl] and [VOL2] were M=Co(II),Ni(II) and Cu(II) ,L=4-(2-methyl-4-oxoquinazoline-3(4H)-yl) benzoic acid were synthesized and characterized by element analysis, magnetic susceptibility ,molar conductance ,FT-IR and UV-visible. The studies indicate that the L acts as doubly monodentate bridge for metal ions and form mononuclear complexes. The complexes are found to be octahedral except V(IV) complex is square pyrimde shape . The structural geometries of compounds were also suggested in gas phase by theoretical treatments, using Hyper chem-6 program for the molecular mechanics and semi-empirical calculations, addition heat of formation(?Hf ?) and binding energy (?Eb)for the free ligan

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jul 02 2020
Journal Name
International Journal Of Drug Delivery Technology
Synthesis, Antibacterial and Molecular Docking Study of Novel 2-Chloro-8-Methoxy-3-Aryl-[1,3] Benzoxazine Derivatives Using Vilsmeier Reagen
...Show More Authors

Reducing of ethyl 4-((2-hydroxy-3-methoxybenzylidene)amino)benzoate (1) afford ethyl 4-((2-hydroxy-3-methoxybenzyl) amino)benzoate (2). Reaction of this compound with Vilsmeier reagent affords novel 2-chloro-[1,3] benzoxazine ring (3). The corresponding acid hydrazide of compound 3 was synthesized from reaction of compound (3) with hydrazine hydrate. Newly series of hydrazones(5a–i) were synthesized from reaction of acid hydrazide with various aryl aldehydes. Antibacterial activity of the hydrazones wassecerned utilizing gram-negative and gram-positive bacteria. Compound (5b) and (5c) exhibited significant antibacterial ability against both gram-negative and gram-positive bacteria, while the compounds(5a) showed mild antibacterial activit

... Show More
Publication Date
Thu May 05 2022
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Classification SINGLE-LEAD ECG by using conventional neural network algorithm
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Jun 23 2020
Journal Name
Baghdad Science Journal
Anomaly Detection Approach Based on Deep Neural Network and Dropout
...Show More Authors

   Regarding to the computer system security, the intrusion detection systems are fundamental components for discriminating attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in early time. However, many challenges arise while developing flexible and efficient network intrusion detection system (NIDS) for unforeseen attacks with high detection rate. In this paper, deep neural network (DNN) approach was proposed for anomaly detection NIDS. Dropout is the regularized technique used with DNN model to reduce the overfitting. The experimental results applied on NSL_KDD dataset. SoftMax output layer has been used with cross entropy loss funct

... Show More
View Publication Preview PDF
Scopus (32)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Sun Dec 09 2018
Journal Name
Baghdad Science Journal
Pose Invariant Palm Vein Identification System using Convolutional Neural Network
...Show More Authors

Palm vein recognition is a one of the most efficient biometric technologies, each individual can be identified through its veins unique characteristics, palm vein acquisition techniques is either contact based or contactless based, as the individual's hand contact or not the peg of the palm imaging device, the needs a contactless palm vein system in modern applications rise tow problems, the pose variations (rotation, scaling and translation transformations) since the imaging device cannot aligned correctly with the surface of the palm, and a delay of matching process especially for large systems, trying to solve these problems. This paper proposed a pose invariant identification system for contactless palm vein which include three main

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (2)
Scopus Crossref
Publication Date
Fri Dec 15 2023
Journal Name
Iraqi Journal Of Laser
Photocatalytic Performance of AgNPs-Zeolite Composite by Hydrothermal Synthesis for Water Splitting
...Show More Authors

Two samples of (Ag NPs-zeolite) nanocomposite thin films have been prepared by easy hydrothermal method for 4 hours and 8 hours inside the hydrothermal autoclave at temperatures of 100°C. The two samples were used in a photoelectrochemical cell as a photocatalyst inside a cell consisting of three electrodes: the working electrode photoanode (AgNPs-zeolite), platinum as a cathode electrode, and Ag/AgCl as a reference electrode, to study the performance of AgNPs-zeolite under dark current and 473 nm laser light for water splitting. The results show the high performance of an eight-hour sample with high crystallinity compared with a four-hour sample as a reliable photocatalyst to generate hydrogen for renewable energies.

 

View Publication Preview PDF
Crossref
Publication Date
Sun Mar 06 2016
Journal Name
Baghdad Science Journal
Synthesis and Characterization of 3 - Substituted Coumarin
...Show More Authors

The reaction of(2-oxo-2H-chromen-3-Carbonyl chloride)(k1) with hydrazine in boiling ethanol gives the hydrazide(K2).When compound (k2) reacts with various aromatic aldehydes ,the corres ponding Schiff bases(k3–k4) achieve new series of thiazotidines (k5–k6) and azetidinones (k7–k8) obtained from the reactions of appropriate Schiff bases with mercapto acetic acid and chloro acetyl chloride respectively. All the compounds are characterized by FT-IR,1H-NMR and GC-Ms.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Preview PDF
Publication Date
Sat Apr 01 2023
Journal Name
International Journal Of Electrical And Computer Engineering (ijece)
Intrusion detection method for internet of things based on the spiking neural network and decision tree method
...Show More Authors

The prevalence of using the applications for the internet of things (IoT) in many human life fields such as economy, social life, and healthcare made IoT devices targets for many cyber-attacks. Besides, the resource limitation of IoT devices such as tiny battery power, small storage capacity, and low calculation speed made its security a big challenge for the researchers. Therefore, in this study, a new technique is proposed called intrusion detection system based on spike neural network and decision tree (IDS-SNNDT). In this method, the DT is used to select the optimal samples that will be hired as input to the SNN, while SNN utilized the non-leaky integrate neurons fire (NLIF) model in order to reduce latency and minimize devices

... Show More
Scopus (22)
Crossref (10)
Scopus Crossref