Preferred Language
Articles
/
BhevNY8BVTCNdQwCXmL3
A new modified differential evolution algorithm scheme-based linear frequency modulation radar signal de-noising
...Show More Authors

The main intention of this study was to investigate the development of a new optimization technique based on the differential evolution (DE) algorithm, for the purpose of linear frequency modulation radar signal de-noising. As the standard DE algorithm is a fixed length optimizer, it is not suitable for solving signal de-noising problems that call for variability. A modified crossover scheme called rand-length crossover was designed to fit the proposed variable-length DE, and the new DE algorithm is referred to as the random variable-length crossover differential evolution (rvlx-DE) algorithm. The measurement results demonstrate a highly efficient capability for target detection in terms of frequency response and peak forming that was isolated from noise distortion. The modified method showed significant improvements in performance over traditional de-noising techniques.

Scopus Clarivate Crossref
View Publication
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm
...Show More Authors

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
View Publication Preview PDF
Scopus (25)
Crossref (18)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2023
Journal Name
Iaes International Journal Of Artificial Intelligence (ij-ai)
Innovations in t-way test creation based on a hybrid hill climbing-greedy algorithm
...Show More Authors

<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. T

... Show More
View Publication
Scopus (2)
Crossref (3)
Scopus Crossref
Publication Date
Wed Nov 24 2021
Journal Name
Iraqi Journal Of Science
A proposal of Multimedia Steganography Algorithm based on Improved Least Significant Bit (LSB) Method
...Show More Authors

Because of the rapid development and use of the Internet as a communication media emerged to need a high level of security during data transmission and one of these ways is "Steganography". This paper reviews the Least Signification Bit steganography used for embedding text file with related image in gray-scale image. As well as we discuss the bit plane which is divided into eight different images when combination them we get the actual image. The findings of the research was the stego-image is indistinguishable to the naked eye from the original cover image when the value of bit less than four Thus we get to the goal is to cover up the existence of a connection or hidden data. The Peak to Signal Noise Ratio(PSNR) and Mean Square Error (

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 20 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Hybrid Algorithm to Protect Computer Networks Based on Human Biometrics and Computer Attributes
...Show More Authors

Objective of this work is the mixing between human biometric characteristics and unique attributes of the computer in order to protect computer networks and resources environments through the development of authentication and authorization techniques. In human biometric side has been studying the best methods and algorithms used, and the conclusion is that the fingerprint is the best, but it has some flaws. Fingerprint algorithm has been improved so that their performance can be adapted to enhance the clarity of the edge of the gully structures of pictures fingerprint, taking into account the evaluation of the direction of the nearby edges and repeat. In the side of the computer features, computer and its components like human have uniqu

... Show More
View Publication Preview PDF
Publication Date
Mon Sep 23 2019
Journal Name
Baghdad Science Journal
New Approach for Solving Three Dimensional Space Partial Differential Equation
...Show More Authors

This paper presents a new transform method to solve partial differential equations, for finding suitable accurate solutions in a wider domain. It can be used to solve the problems without resorting to the frequency domain. The new transform is combined with the homotopy perturbation method in order to solve three dimensional second order partial differential equations with initial condition, and the convergence of the solution to the exact form is proved. The implementation of the suggested method demonstrates the usefulness in finding exact solutions. The practical implications show the effectiveness of approach and it is easily implemented in finding exact solutions.

       Finally, all algori

... Show More
View Publication Preview PDF
Scopus (21)
Crossref (10)
Scopus Clarivate Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
A Class of Exponential Rayleigh Distribution and New Modified Weighted Exponential Rayleigh Distribution with Statistical Properties
...Show More Authors

This paper deals with the mathematical method for extracting the Exponential Rayleighh  distribution based on mixed between the cumulative distribution function of Exponential distribution and  the cumulative distribution function of Rayleigh distribution using an application (maximum), as well as derived different statistical properties for  distribution, and present a structure of a new distribution based on a modified weighted version of Azzalini’s (1985) named Modified Weighted Exponential Rayleigh  distribution such that this new distribution is generalization of the  distribution and provide some special models of the  distribution, as well as derived different statistical properties for  distribution

View Publication Preview PDF
Crossref
Publication Date
Thu Nov 30 2023
Journal Name
Iraqi Journal Of Science
Mean Square Exponential Stability of Semi-Linear Stochastic Perturbed Differential Equation Via Lyapunov Function Approach
...Show More Authors

    In this work, a class of stochastically perturbed differential systems with standard Brownian motion of ordinary unperturbed differential system is considered and studied. The necessary conditions for the existence of a unique solution of the stochastic perturbed semi-linear system of differential equations are suggested and supported by concluding remarks. Some theoretical results concerning the mean square exponential stability of the nominal unperturbed deterministic differential system and its equivalent stochastically perturbed system with the deterministic and stochastic process as a random noise have been stated and proved. The proofs of the obtained results are based on using the stochastic quadratic Lyapunov function meth

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 15 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Open Newton Contes Formula for Solving Linear Voltera Integro-Differential Equation of the First Order
...Show More Authors

  In this work, some of numerical methods for solving first order linear Volterra IntegroDifferential Equations are presented.      The numerical solution of these equations is obtained by using Open Newton Cotes formula.      The Open Newton Cotes formula is applied to find the optimum solution for this equation.      The computer program is written in (MATLAB) language (version 6)

View Publication Preview PDF
Publication Date
Tue Mar 30 2021
Journal Name
Iraqi Journal Of Science
Using Multi-Objective Bat Algorithm for Solving Multi-Objective Non-linear Programming Problem
...Show More Authors

Human beings are greatly inspired by nature. Nature has the ability to solve very complex problems in its own distinctive way. The problems around us are becoming more and more complex in the real time and at the same instance our mother nature is guiding us to solve these natural problems. Nature gives some of the logical and effective ways to find solutions to these problems. Nature acts as an optimized source for solving the complex problems.  Decomposition is a basic strategy in traditional multi-objective optimization. However, it has not yet been widely used in multi-objective evolutionary optimization.   

Although computational strategies for taking care of Multi-objective Optimization Problems (MOPs) h

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (7)
Scopus Crossref
Publication Date
Fri Sep 01 2023
Journal Name
Al-khwarizmi Engineering Journal
High Transaction Rates Performance Evaluation for Secure E-government Based on Private Blockchain Scheme
...Show More Authors

 

The implementation of technology in the provision of public services and communication to citizens, which is commonly referred to as e-government, has brought multitude of benefits, including enhanced efficiency, accessibility, and transparency. Nevertheless, this approach also presents particular security concerns, such as cyber threats, data breaches, and access control. One technology that can aid in mitigating the effects of security vulnerabilities within e-government is permissioned blockchain. This work examines the performance of the hyperledger fabric private blockchain under high transaction loads by analyzing two scenarios that involve six organizations as case studies. Several parameters, such as transaction send ra

... Show More
View Publication Preview PDF
Crossref