Preferred Language
Articles
/
ARbpGYcBVTCNdQwCZTfG
An Interference Mitigation Scheme for Millimetre Wave Heterogeneous Cloud Radio Access Network with Dynamic RRH Clustering
...Show More Authors

Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
2nd International Conference For Engineering Sciences And Information Technology (esit 2022): Esit2022 Conference Proceedings
Determination of time-dependent coefficient in inverse coefficient problem of fractional wave equation
...Show More Authors

View Publication
Scopus Crossref
Publication Date
Tue Oct 08 2002
Journal Name
Iraqi Journal Of Laser
Cross-focusing Effect of Two Intense Laser Beams on Electron Plasma Wave Excitation
...Show More Authors

This paper presents the effect of relativistic and ponderomotive nonlinearity on cross-focusing of two intense laser beams in a collisionless and unmagnetized plasma. It should be noted here that while considering the self-focusing due to relativistic electron mass variation, the electron ponderomotive density depression in the channel may also be important. Therefore/these two nonlinearties may simultaneously affect the self-focusing process. These nonlinearities depend not only on the intensity of one laser but also on the second laser. Therefore, one laser beam affects the dynamics of the second beam and hence the process of cross-focusing takes place. The electric field amplitude of the excited electron plasma wave (EPW) has been cal

... Show More
View Publication Preview PDF
Publication Date
Mon May 01 2023
Journal Name
Environmental Nanotechnology, Monitoring & Management
Photodegradation of tetracycline antibiotic by ternary recyclable Z-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 photocatalyst with improved charge separation efficiency: Characterization and mechanism studies
...Show More Authors

View Publication
Scopus (32)
Crossref (9)
Scopus Crossref
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Optimum Dimensions of Hydraulic Structures and Foundation Using Genetic Algorithm coupled with Artificial Neural Network
...Show More Authors

      A model using the artificial neural networks and genetic algorithm technique is developed for obtaining optimum dimensions of the foundation length and protections of small hydraulic structures. The procedure involves optimizing an objective function comprising a weighted summation of the state variables. The decision variables considered in the optimization are the upstream and downstream cutoffs lengths and their angles of inclination, the foundation length, and the length of the downstream soil protection. These were obtained for a given maximum difference in head, depth of impervious layer and degree of anisotropy. The optimization carried out is subjected to constraints that ensure a safe structure aga

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 01 2023
Journal Name
Journal Of Photochemistry And Photobiology A: Chemistry
Multipurpose properties the Z-scheme dimanganese copper oxide/cadmium sulfide nanocomposites for photo- or photoelectro-catalytic, antibacterial applications, and thiamine detection process
...Show More Authors

View Publication
Scopus (58)
Crossref (58)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Materials Science In Semiconductor Processing
A dual S-scheme g-C3N4/Fe3O4/Bi2WO6/Bi2S3 heterojunction for improved photocatalytic decomposition of methylene blue: Proposed mechanism, and stability studies
...Show More Authors

View Publication
Scopus (53)
Crossref (50)
Scopus Clarivate Crossref
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.

Publication Date
Mon Apr 11 2011
Journal Name
Icgst
Employing Neural Network and Naive Bayesian Classifier in Mining Data for Car Evaluation
...Show More Authors

In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). This paper investigates the performance of these two classification methods using the Car Evaluation dataset. Two models were built for both algorithms and the results were compared. Our experimental results indicated that the BNN classifier yield higher accuracy as compared to the NB classifier but it is less efficient because it is time-consuming and difficult to analyze due to its black-box implementation.

Publication Date
Wed May 01 2013
Journal Name
Journal Of Computer Science
PROTOCOLS FOR SECURE ROUTING AND TRANSMISSION IN MOBILE AD HOC NETWORK: A REVIEW
...Show More Authors

Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic

... Show More
View Publication Preview PDF
Scopus (8)
Crossref (5)
Scopus Crossref
Publication Date
Mon Apr 15 2019
Journal Name
Proceedings Of The International Conference On Information And Communication Technology
Re-evaluation of the stable improved LEACH routing protocol for wireless sensor network
...Show More Authors

View Publication
Scopus (16)
Crossref (12)
Scopus Clarivate Crossref