Preferred Language
Articles
/
rBb7UYoBVTCNdQwCfJRG
USING FUZZY LOGIC CONTROLLER FOR A TWO- TANK LEVEL CONTROL SYSTEM
...Show More Authors

This paper presents a fuzzy logic controller for a two-tank level control system, which is a process with a dead time. The fuzzy controller is a proportional-integral (PI-like) fuzzy controller which is suitable for steady state behavior of the system. Transient behavior of the system was improved without the need for a derivative action by suitable change in the rule base of the controller. Simulation results showed the step response of the two-tank level control system when this controller was used to control this plant and the effect of the dead time on the response of the system.

Publication Date
Wed Mar 29 2017
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Validity of Generalized Standard Addition Method for a Mixture of Amino Acid Analysis
...Show More Authors

A Modified version of the Generlized standard addition method ( GSAM) was developed. This modified version was used for the quantitative determination of arginine   (Arg) and glycine ( Gly) in arginine  acetyl salicylate – glycine complex . According to this method two linear equations were solved to obtain the amounts of (Arg) and (Gly). The first equation was obtained by spectrophotometic measurement of the total absorbance of (Arg) and (Gly) colored complex with ninhydrin . The second equation was obtained by measuring the total acid consumed by total amino groups of (Arg) and ( Gly). The titration was carried out in non- aqueous media using perchloric acid in glacial acetic acid as a titrant. The developed metho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 18 2025
Journal Name
Pattern Recognition And Artificial Intelligence
Utilizing Energy-Efficient Deep Learning Technique for Age Estimation Through a Hybrid Methodology
...Show More Authors

This study employs evolutionary optimization and Artificial Intelligence algorithms to determine an individual’s age using a single-faced image as the basis for the identification process. Additionally, we used the WIKI dataset, widely considered the most comprehensive collection of facial images to date, including descriptions of age and gender attributes. However, estimating age from facial images is a recent topic of study, even though much research has been undertaken on establishing chronological age from facial photographs. Retrained artificial neural networks are used for classification after applying reprocessing and optimization techniques to achieve this goal. It is possible that the difficulty of determining age could be reduce

... Show More
View Publication
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Ieee Access
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
...Show More Authors

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. T

... Show More
View Publication Preview PDF
Scopus (17)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Mon Apr 07 2025
Journal Name
The Peerian Journal
Plant-Bacterial Interactions: A latent Alliance for Growth promotion and Environmental Stress Tolerance
...Show More Authors

This encapsulates the general relationship between plant and bacteria in the natural and agricultural ecosystem. It is based on the activities of useful bacteria, such as plant growth-promoting bacteria (PGPRs) and nitrogen-fixing bacteria, in promoting plant growth and plant tolerance to stressful situations regarding pollution, salinity, and drought. The article also mentions that the bacteria maintain plant health by secretion of phytohormones, nitrogen fixation, solubilization of phosphate, and production of antibiotics against pathogenic bacteria. The article also mentions the existing applications of the interaction in sustainable agriculture and bioremediation of contaminated soils.

View Publication Preview PDF
Publication Date
Mon Dec 25 2017
Journal Name
Al-khwarizmi Engineering Journal
A new Cumulative Damage Model for Fatigue Life Prediction under Shot Peening Treatment
...Show More Authors

 Abstract

In this paper, fatigue damage accumulation were studied using many methods i.e.Corton-Dalon (CD),Corton-Dalon-Marsh(CDM), new non-linear model and experimental method. The prediction of fatigue lifetimes based on the two classical methods, Corton-Dalon (CD)andCorton-Dalon-Marsh (CDM), are uneconomic and non-conservative respectively. However satisfactory predictions were obtained by applying the proposed non-linear model (present model) for medium carbon steel compared with experimental work. Many shortcomings of the two classical methods are related to their inability to take into account the surface treatment effect as shot peening. It is clear that the new model shows that a much better and cons

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
...Show More Authors

The advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sat Jul 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Polyacrylonitrile Nanofiber Composites as Efficient Removal of Pollutants for Wastewater: A Review Article
...Show More Authors

Polyacrylonitrile nanofiber (PANFS), a well-known polymers, has been extensively employed in the manufacturing of carbon nanofibers (CNFS), which have recently gained substantial attention due to their excellent features, such as spinnability, environmental friendliness, and commercial feasibility. Because of their high carbon yield and versatility in tailoring the final CNFS structure, In addition to the simple formation of ladder structures through nitrile polymerization to yield stable products, CNFS and PAN have been the focus of extensive research as potential production precursors. For instance, the development of biomedical and high-performance composites has now become achievable. PAN homopolymer or PAN-based precursor copolymer can

... Show More
Publication Date
Sat Dec 30 2023
Journal Name
Traitement Du Signal
Optimizing Acoustic Feature Selection for Estimating Speaker Traits: A Novel Threshold-Based Approach
...Show More Authors

View Publication
Clarivate Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Bulletin Of Electrical Engineering And Informatics
A model for incorporating suitable methods of usability evaluation into agile software development
...Show More Authors

The challenge to incorporate usability evaluation values and practices into agile development process is not only persisting but also systemic. Notable contributions of researchers have attempted to isolate and close the gaps between both fields, with the aim of developing usable software. Due to the current absence of a reference model that specifies where and how usability activities need to be considered in the agile development process. This paper proposes a model for identifying appropriate usability evaluation methods alongside the agile development process. By using this model, the development team can apply usability evaluations at the right time at the right place to get the necessary feedback from the end-user. Verificatio

... Show More
View Publication
Scopus (4)
Crossref (3)
Scopus Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Bulletin Of Electrical Engineering And Informatics
A missing data imputation method based on salp swarm algorithm for diabetes disease
...Show More Authors

Most of the medical datasets suffer from missing data, due to the expense of some tests or human faults while recording these tests. This issue affects the performance of the machine learning models because the values of some features will be missing. Therefore, there is a need for a specific type of methods for imputing these missing data. In this research, the salp swarm algorithm (SSA) is used for generating and imputing the missing values in the pain in my ass (also known Pima) Indian diabetes disease (PIDD) dataset, the proposed algorithm is called (ISSA). The obtained results showed that the classification performance of three different classifiers which are support vector machine (SVM), K-nearest neighbour (KNN), and Naïve B

... Show More
View Publication
Scopus (7)
Crossref (2)
Scopus Crossref